Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 10:16

General

  • Target

    aed7641f7355689a3d545173de33a061_JaffaCakes118.dll

  • Size

    56KB

  • MD5

    aed7641f7355689a3d545173de33a061

  • SHA1

    9fdfa34b81407242e4aa9d19ac0a243887c3e3c1

  • SHA256

    020da48d06ccbb99645069c61266cc6c7d334612750e0bde2d4815c8840c036a

  • SHA512

    c5d3ea71fdd6e3f28a97a891f4004d22bbe7bd6b4141b963a4395c798e79fdcd6be040e6ed43892d7d7ba3cb30d81951fb89ea8a023978f409a8a27780f28b0a

  • SSDEEP

    768:2lPIMx2+aL3Bypkw80Y3hT21SUVVtqSQ4AGt/iB94sidP40zwKFJk5TsQN5kNAc9:MPIu23R0ahTKNVVtqS8GtRrWsBAc9

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\aed7641f7355689a3d545173de33a061_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:724
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\aed7641f7355689a3d545173de33a061_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads