Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 00:45

General

  • Target

    d563d69cd52ac88d9f6f0858f30817f9_JaffaCakes118.dll

  • Size

    32KB

  • MD5

    d563d69cd52ac88d9f6f0858f30817f9

  • SHA1

    56f4e0f790406983456f2a006e4edb7f40c8614f

  • SHA256

    2f41ee549a8386f5945644299ba0b78c985e0b478cb2efaa6b507a59935e45de

  • SHA512

    7d0d9e479bdee75ba602c223cb5be00404f2bbe14a3b1abf3cb88efca010ead469a14ae6bce0e4f6b41b9412c3d308268c63e3bf80d15571ee76389b0bd2d0b0

  • SSDEEP

    384:LQ6ngB7F9g9Ff/6hAwbKvpt7BqussGnxKKayn77KcG32MlTCawYJFJ2d7j7bk1W:Tg9Qf/68pDVunFn79GmMBChqD2dj7bZ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d563d69cd52ac88d9f6f0858f30817f9_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d563d69cd52ac88d9f6f0858f30817f9_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:264

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads