Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 00:27

General

  • Target

    c1e888c39c78930f204fbe36ac6ecab2_JaffaCakes118.dll

  • Size

    116KB

  • MD5

    c1e888c39c78930f204fbe36ac6ecab2

  • SHA1

    9ea4f3b59beae791ea67114d65c639c2eda817fe

  • SHA256

    7655bc015be7c53884d0a63a822917a3d7885279dfd446ec17ad7ac3023f5f2a

  • SHA512

    27e2bc09bf92510ffd80a9ef1c7f36eb63157f8ee06d66683cd2131c29fdfaa8ef196c54eac23bd3d1751fe2d1e89733a235861373d9b9900413588a58bad257

  • SSDEEP

    3072:ZPFrKYJiIG1S/WgUNuNf1SU3UzeGkA83+LW:rrZJPMYKUEze3AxL

Score
7/10

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NTFS ADS 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c1e888c39c78930f204fbe36ac6ecab2_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c1e888c39c78930f204fbe36ac6ecab2_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • NTFS ADS
      PID:2208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2208-6-0x00000000001D0000-0x00000000001DD000-memory.dmp

    Filesize

    52KB

  • memory/2208-5-0x0000000000180000-0x0000000000188000-memory.dmp

    Filesize

    32KB

  • memory/2208-4-0x00000000001D0000-0x00000000001DD000-memory.dmp

    Filesize

    52KB

  • memory/2208-3-0x00000000001D0000-0x00000000001DD000-memory.dmp

    Filesize

    52KB

  • memory/2208-0-0x00000000001D0000-0x00000000001DD000-memory.dmp

    Filesize

    52KB