Analysis

  • max time kernel
    133s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 07:29

General

  • Target

    b6d3f430ebcff435d2e07b57bd22a5c3_JaffaCakes118.dll

  • Size

    42KB

  • MD5

    b6d3f430ebcff435d2e07b57bd22a5c3

  • SHA1

    bb474312ed5c6507124c2a3678b5e6a0e9fcf770

  • SHA256

    13deec805e0b3cc5bf074c74490fb9330a613ed1f0ada6608faa09efe9eb4a2d

  • SHA512

    cd1b29990c1632f797ee38bc54cc72e5abc68f20fc6cbf81f8d4ca17fef7a13846fd44490c6c7245b0a933adaf5af8b1830661fd095b172e3f06cc7b3956a4aa

  • SSDEEP

    768:gDCR2xHn/+30W1IOtk/PNBXRXuX0Zoqbjnt:1R29/+3f1IOtcPNBXRXuX6Ljnt

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b6d3f430ebcff435d2e07b57bd22a5c3_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b6d3f430ebcff435d2e07b57bd22a5c3_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads