Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 14:16

General

  • Target

    ab5a0a76a4143d49dfad3530da041dc9_JaffaCakes118.dll

  • Size

    30KB

  • MD5

    ab5a0a76a4143d49dfad3530da041dc9

  • SHA1

    b7790a4c644f7fa5f0ae9635c02ef59850d125c5

  • SHA256

    b8c5fe718e9ecbf14f6a60dd7c4a0bf9cc19e6816297b063399e3312e6d629d5

  • SHA512

    42d00e3fc0b72c261cc3f85993bc7a3233c6d1d66e3e0b1debfd5799fae6b75954bbf5c52e71693c9cec6f746c6326d547fd006b48a4e1a4fedeade494197844

  • SSDEEP

    768:Re6rDrM887jnM+EmwgLhSxyYGSPXIWwe/fnbzw64:RdIznk6qXNPL/vbzw64

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ab5a0a76a4143d49dfad3530da041dc9_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ab5a0a76a4143d49dfad3530da041dc9_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads