Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2024 23:43

General

  • Target

    df1bc6c17dc819f35f8ec1c303cd60b3_JaffaCakes118.dll

  • Size

    19KB

  • MD5

    df1bc6c17dc819f35f8ec1c303cd60b3

  • SHA1

    845daa0cb9e8997daafc035568fbaa36b4752207

  • SHA256

    ba7603fa84be051323b51d5d58d08797d8c51599b0d5bed4fd6938173977a86b

  • SHA512

    39435f6a0d21f423029e8e15163f8126e54c39400dc5c8f7f2d574abf656177c74206c3ae7f1ff2ab9e75a8968642dfdbf88058a9ed600c3ded0c5d776579162

  • SSDEEP

    384:3dDtmzTj0jHKDlz13yKDlNbzXRCsNmCsDbCsisr:3yTjvb4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\df1bc6c17dc819f35f8ec1c303cd60b3_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\df1bc6c17dc819f35f8ec1c303cd60b3_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads