Analysis

  • max time kernel
    132s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 20:20

General

  • Target

    c17f55d288b02e3505b42b84617ea7f3_JaffaCakes118.dll

  • Size

    99KB

  • MD5

    c17f55d288b02e3505b42b84617ea7f3

  • SHA1

    1d42ecb504fad880a4f97e10b12d7bbf6c1392e6

  • SHA256

    5831d89bc446a14c7cf7d91d93bcc5efa8d7dad3acba890a66d3e287363f72d5

  • SHA512

    03caa9c61e723c8f0ce0206f5bca5e20796eca4349ca310d8ad1d6e919e68d516a54bf9491f81d2db33bcb818ee0f1f28cc2d52dc6e64642d8e57ead30c685eb

  • SSDEEP

    1536:WevutjAtpyt+XftIqxjyTbie7JDmTqJXCXA3eBKnZIB6hmRs+QsguH:WevutjALyVXrJDmTIwgnf4Rs+yuH

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c17f55d288b02e3505b42b84617ea7f3_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c17f55d288b02e3505b42b84617ea7f3_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3472

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads