Analysis

  • max time kernel
    133s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 03:24

General

  • Target

    b62a2f8e6eca77bd4d73b5e6086a8f36_JaffaCakes118.dll

  • Size

    128KB

  • MD5

    b62a2f8e6eca77bd4d73b5e6086a8f36

  • SHA1

    17991cc53b53760ccf5422d05c7c6425004d8d97

  • SHA256

    c982b845b4c40f061718201c687e8ab4aecf019b64cb24f9926671a22b595ff7

  • SHA512

    501c4b0f992caa4ba8d047d49b2a47b46ef62c6f2d51505dd5ad48e7867b08c584ba7a81610e2578f7bcedd60463be9c7354b9f26b42cbb61f7f5272d446b081

  • SSDEEP

    3072:S+H46rU50oY8ACCq4DcXQILUdFzzMqqDLy/goDbc:6ekpS0QjFzAqqDLug

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b62a2f8e6eca77bd4d73b5e6086a8f36_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3824
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b62a2f8e6eca77bd4d73b5e6086a8f36_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2652-0-0x0000000010017000-0x0000000010026000-memory.dmp

    Filesize

    60KB

  • memory/2652-1-0x00000000013D0000-0x00000000013DA000-memory.dmp

    Filesize

    40KB