Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 07:28

General

  • Target

    bad6b9030d82dc767c6580da52fce1be_JaffaCakes118.dll

  • Size

    64KB

  • MD5

    bad6b9030d82dc767c6580da52fce1be

  • SHA1

    ce9b3fb4059920f0ca30cf4c08d4503c39677286

  • SHA256

    1dff16bc9e34cd33ddf9eb2b6bc4261dda318410d955742ae6c2e40b3b6cadaf

  • SHA512

    a0e1f26d88bbe63dc2960b6bd3db63eb97604e3f34700e0a7166190e8002cb769c2d755d65842d3afb8799255071127b50bbd0da8efc585933728aa4f1167502

  • SSDEEP

    1536:V8O9Nn6RjriUyEn5CT1BuWu9YQg4/D000z5B3KVIIEQB3:2Oz6VWhmC5BC9GJz6VBEQB3

Score
7/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bad6b9030d82dc767c6580da52fce1be_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bad6b9030d82dc767c6580da52fce1be_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1228-0-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB