Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 00:26 UTC

General

  • Target

    ea40327e6df67913feba0fd7c22d95a2_JaffaCakes118.dll

  • Size

    198KB

  • MD5

    ea40327e6df67913feba0fd7c22d95a2

  • SHA1

    eb1869c6efc98d49446b0cc87e7b4ba88fcd1711

  • SHA256

    f399419a5bc75941d5eeba79a8a879c2df83545f2848d2f372ee616a12992af5

  • SHA512

    75db25edfe9db6d3f1eae074344f59abc3fda4ddca186a9c88bfe9ce4840dcb06eb6d977c5a8d4010a378ff5feddfac16374c2c1ddc5e946bffd09ce2e02b4a1

  • SSDEEP

    3072:f22Zvy03m4S8jfH6lCJTnOf94HjGRa0Y4G0dw06aII6BuDU7IFyVg9vOOTa8VRaD:eG04dD6lCJTnO1GQa9Fx2UsBGwwia

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ea40327e6df67913feba0fd7c22d95a2_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3868
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ea40327e6df67913feba0fd7c22d95a2_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1032

Network

  • flag-us
    DNS
    196.249.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    196.249.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    67.31.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    67.31.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    12wqdq4.cdn66.downloadshosting.com
    rundll32.exe
    Remote address:
    8.8.8.8:53
    Request
    12wqdq4.cdn66.downloadshosting.com
    IN A
    Response
  • flag-us
    DNS
    133.211.185.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.211.185.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    241.150.49.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.150.49.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    50.23.12.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    50.23.12.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    56.126.166.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    56.126.166.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    232.135.221.88.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    232.135.221.88.in-addr.arpa
    IN PTR
    Response
    232.135.221.88.in-addr.arpa
    IN PTR
    a88-221-135-232deploystaticakamaitechnologiescom
  • flag-us
    DNS
    12wqdq9.cdn66.downloadshosting.com
    rundll32.exe
    Remote address:
    8.8.8.8:53
    Request
    12wqdq9.cdn66.downloadshosting.com
    IN A
    Response
  • flag-us
    DNS
    79.190.18.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    79.190.18.2.in-addr.arpa
    IN PTR
    Response
    79.190.18.2.in-addr.arpa
    IN PTR
    a2-18-190-79deploystaticakamaitechnologiescom
  • flag-us
    DNS
    44.56.20.217.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    44.56.20.217.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    196.249.167.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    196.249.167.52.in-addr.arpa

  • 8.8.8.8:53
    67.31.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    67.31.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    12wqdq4.cdn66.downloadshosting.com
    dns
    rundll32.exe
    80 B
    153 B
    1
    1

    DNS Request

    12wqdq4.cdn66.downloadshosting.com

  • 8.8.8.8:53
    133.211.185.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    133.211.185.52.in-addr.arpa

  • 8.8.8.8:53
    241.150.49.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    241.150.49.20.in-addr.arpa

  • 8.8.8.8:53
    50.23.12.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    50.23.12.20.in-addr.arpa

  • 8.8.8.8:53
    56.126.166.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    56.126.166.20.in-addr.arpa

  • 8.8.8.8:53
    232.135.221.88.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    232.135.221.88.in-addr.arpa

  • 8.8.8.8:53
    12wqdq9.cdn66.downloadshosting.com
    dns
    rundll32.exe
    80 B
    153 B
    1
    1

    DNS Request

    12wqdq9.cdn66.downloadshosting.com

  • 8.8.8.8:53
    79.190.18.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    79.190.18.2.in-addr.arpa

  • 8.8.8.8:53
    44.56.20.217.in-addr.arpa
    dns
    71 B
    131 B
    1
    1

    DNS Request

    44.56.20.217.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1032-1-0x0000000002E00000-0x0000000002E33000-memory.dmp

    Filesize

    204KB

  • memory/1032-5-0x0000000002DD0000-0x0000000002DF1000-memory.dmp

    Filesize

    132KB

  • memory/1032-0-0x0000000002DD0000-0x0000000002DF1000-memory.dmp

    Filesize

    132KB

  • memory/1032-6-0x0000000002DD0000-0x0000000002DF1000-memory.dmp

    Filesize

    132KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.