Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:38

General

  • Target

    ea839016bcb80277d42f151fa8ed02c0_JaffaCakes118.dll

  • Size

    95KB

  • MD5

    ea839016bcb80277d42f151fa8ed02c0

  • SHA1

    05128fa1077e4730ec30174855f0963a13a3dd5d

  • SHA256

    ebf1c9d6664655c36c0f042970c205b4e2e8bf034b5468466c97f5105b65827b

  • SHA512

    5725944d4bf12e737c164aa7bbf3c2d62b382552bcf60b34dcb9cf8e253c9fce9704f9ffa32783ee0e97dc84ce2c6315cf40bdb5a31bd63329a9ba96e4696075

  • SSDEEP

    1536:UdVYsWgcQV6w/jdt9YD6QcZCFnoY5WvwV+N05r7G7S3pybZq/lVe:Ud5W8kw/jdt9YDJyCFsvCy05r7G7Skbf

Score
7/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ea839016bcb80277d42f151fa8ed02c0_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ea839016bcb80277d42f151fa8ed02c0_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1040-0-0x0000000010000000-0x000000001000E000-memory.dmp

    Filesize

    56KB