Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 17:18

General

  • Target

    dcb0f6ff8abffbec2cdbacea72d23956_JaffaCakes118.dll

  • Size

    25KB

  • MD5

    dcb0f6ff8abffbec2cdbacea72d23956

  • SHA1

    1daba38e92e311f24cd78daeee97ec809b86c616

  • SHA256

    b7be29fe77da80d7e69e898e470be74cf3d7af8c210c06839f2edf69ba49d0ba

  • SHA512

    50352452db18dae262d7077e23b4300a3d02b4b690e69c983ebea2d2afeba6e00b00630a93a15c594175768f16367d15d4754b0f175b58f008a2b6a935cf8897

  • SSDEEP

    384:P46Q4iW4NuaztttavknvDClfd177bI9CnqD2Y6awzfaRrx5:Pa4ZazttXvDCf17g9CqD56hzyRrx5

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\dcb0f6ff8abffbec2cdbacea72d23956_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\dcb0f6ff8abffbec2cdbacea72d23956_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads