Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 07:19

General

  • Target

    c86bd8096a0fb22e41370e0a8c836bc7_JaffaCakes118.dll

  • Size

    32KB

  • MD5

    c86bd8096a0fb22e41370e0a8c836bc7

  • SHA1

    9c7e3967f6e23a9c560ae5b32a68a43b4095aa8a

  • SHA256

    47eda360dcb143db3c60c419faa9ff5006a6695f28289bf18ec2dcfafc864751

  • SHA512

    5e792d1fd6479dc1f2f32845497a9b5cf2ca4e6fc2f5b7b41c3b64380b96f335f93c421afe611de6d9698018280e31dc9abc18c220ee3261ceb3567c9b6c48f0

  • SSDEEP

    384:zFqL0mh9NfNryPHkx0bzSYAk8kVfO5Y4ZXXqGa/77y4gk+vjt4mt6dyRH+eAvvCD:xqLJLLEIkVf5/75L+vjGm4dA5ACRI8Dt

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c86bd8096a0fb22e41370e0a8c836bc7_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c86bd8096a0fb22e41370e0a8c836bc7_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads