Analysis

  • max time kernel
    137s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-08-2024 07:04

General

  • Target

    c033d6671d5a0e83ad006cc5fe317f2f_JaffaCakes118.dll

  • Size

    63KB

  • MD5

    c033d6671d5a0e83ad006cc5fe317f2f

  • SHA1

    04617a8e95e691501fe475468ccfe068f8b5c8c1

  • SHA256

    b25a7ea27977f3c1b7cbd7a73a4480d2d4af5c9bd6c2c13fd78d3c99a66d8c92

  • SHA512

    78fbd6a3c95f3d78ea7135eb97d695706539aeebb2deb4d162f32f0eafc05890dccc6c27e1beb0928e6ba9d9d9a0a0f7e155dba49702adca50eeb456ce60451c

  • SSDEEP

    1536:XMOkOCj/WhkKA4oKq+/TiMxdh+DV6HB5Ofl+:aghhT/OyfgJ+

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c033d6671d5a0e83ad006cc5fe317f2f_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4276
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c033d6671d5a0e83ad006cc5fe317f2f_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads