Analysis

  • max time kernel
    93s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 05:12

General

  • Target

    dbdfa4e485be3edd07c35dcf03c2a400_JaffaCakes118.dll

  • Size

    69KB

  • MD5

    dbdfa4e485be3edd07c35dcf03c2a400

  • SHA1

    7278159dd14d4fb336b0732416c1186683229721

  • SHA256

    b1ae3050a2b48e1d0cc890939eff95f8ece603fcecd581aa0cda77ab9d642924

  • SHA512

    ee04b878e705e735f8da07a258d4ef84504e0debbc36602180b38d6d9097bcf9751f4ef3414e0fe3ffa758a2f06618885ad0ceb50713207bc4bbfbfbe7b2f84c

  • SSDEEP

    768:I4GuXCvvcL43ImMQEtGqhGwwi5hik24hLsOdh7KgpNtUCJIetWyKnDL/KlFbG6yi:7yvJ3IHXhGwlskvLsU8geoBcT+jyFzg

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\dbdfa4e485be3edd07c35dcf03c2a400_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:712
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\dbdfa4e485be3edd07c35dcf03c2a400_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2204

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads