Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 01:31

General

  • Target

    d33dce4e83d25eb00cc9601d4d01fa0f_JaffaCakes118.dll

  • Size

    91KB

  • MD5

    d33dce4e83d25eb00cc9601d4d01fa0f

  • SHA1

    7f7fa74810d21615a83fe2122102a4e2d763e9a9

  • SHA256

    81e69fc9539e45936c2fb509611fa50e6cf15b6c85447185818dbf657de4d5b1

  • SHA512

    e726c2f2cbfc0e457abbcaf8422715291e7f6211263bffcc86a4441d6f5db8a80873abdecff289ddfe81902e0d0d27f64df571fce5a35f793ccc70897cc84f16

  • SSDEEP

    1536:2Nh6oO0AmTdwG2EGKhNoesA1jpLM9kTZJB91h56QiullcwYl//CEeYau89W:2Nk7ciG21enjpL+e9q3ullO//CTW

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d33dce4e83d25eb00cc9601d4d01fa0f_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d33dce4e83d25eb00cc9601d4d01fa0f_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/684-0-0x0000000000770000-0x0000000000870000-memory.dmp

    Filesize

    1024KB