Analysis

  • max time kernel
    135s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 19:06

General

  • Target

    dcdf77169dd0f36c67a13f832f68a518_JaffaCakes118.dll

  • Size

    124KB

  • MD5

    dcdf77169dd0f36c67a13f832f68a518

  • SHA1

    d231b260f3ec24e9e1da6c71650d4a51f64c9631

  • SHA256

    21f17cb5cbc866c385d2b554aaeaaa9ab99c93a1c79cd0ad8c983f3d2f426db9

  • SHA512

    4e323fcd36e45754c08c3fc750b8e2882eadd1727f3960eae32c6eabdc5854ee19542c520adc1bafff30ff7de082ea263d27fde7cf950ac78abc410108c797b0

  • SSDEEP

    1536:BA/JTjuwpcxRaMrx5PNYrKqq5CwwozhOtftHpdwbHaIxQukFlfdVjouVMo:BA/JTjuheMrFQwieb6IxXYlfdVfu

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\dcdf77169dd0f36c67a13f832f68a518_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\dcdf77169dd0f36c67a13f832f68a518_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2096-0-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB