Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 08:45

General

  • Target

    bb0c3bdfad2d5209e59bb602ea75657d_JaffaCakes118.dll

  • Size

    10KB

  • MD5

    bb0c3bdfad2d5209e59bb602ea75657d

  • SHA1

    9d8572dceff0a1554e1fbb8f329af00cefbb106b

  • SHA256

    8cd6085e76f2c11775fcc6e3975bdb41a5aaaa66d7ffbd6dc2bb605840702eea

  • SHA512

    21abf3a5b496627d78656845751c5699311257c349874ee19867736098a877f2c414347b3369c2a2651c60f4b86b6b12b4f65a9a6a840f156687e9066fe4555d

  • SSDEEP

    192:8hZix0/qhNNRYqNTACZUP4+BClqPcc8E1ryvQG3cINSrqO:uwphNNRYAACZUPyAcP2mvQFIgeO

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bb0c3bdfad2d5209e59bb602ea75657d_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bb0c3bdfad2d5209e59bb602ea75657d_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads