Analysis

  • max time kernel
    92s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 04:20

General

  • Target

    cea3bc465161cd24b77c542d98caf1c8_JaffaCakes118.dll

  • Size

    1.5MB

  • MD5

    cea3bc465161cd24b77c542d98caf1c8

  • SHA1

    6496e261e11d2616c46c6afde38207a142c3a5a0

  • SHA256

    44d7101a3bdbbd1319fd8b50c9b4efd9c5859f5ca8a0b393f03d228fd028ed0c

  • SHA512

    b2c47952093d708d86892784c60f28e52e7ccc9ccebea7ed2c71288500c05e7883ece8aa77362ae207112fafc952b1e4d2d42a1547edcda580daa7bc07bfdc0d

  • SSDEEP

    24576:B+7oR3P78x7DmMc1l9Brm0dCWfR3YbtT9xYQrjzDff8pkzuVKU0NEd9YLcknK:BUKjmmnm0NZ3YbtZxYGrtE7YLcknK

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\cea3bc465161cd24b77c542d98caf1c8_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\cea3bc465161cd24b77c542d98caf1c8_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1316-0-0x0000000029720000-0x0000000029C0A000-memory.dmp

    Filesize

    4.9MB