Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:15

General

  • Target

    eabdf7c5f8042e1cc046903839e14a67_JaffaCakes118.dll

  • Size

    245KB

  • MD5

    eabdf7c5f8042e1cc046903839e14a67

  • SHA1

    981468f119ecc502d9aa2881ddcff2ffed478ca4

  • SHA256

    c2acb13d910de8062e032adbba30d36ed8d8fe47f96fd6f9b51a933c12d2bc6e

  • SHA512

    328721248392535e3e14cbc035d3a297f0bbc18f9491c1bc65237c70dd53022acf9ab72b64648d6fe5ce6df6ba63659850fc1ce9e8bc34d990fc2cc1cf8e6392

  • SSDEEP

    6144:muMwsv5SMNGaZLKnHfqoz3Lw6ckMaLxs5iBVz0SL0ZWy:mRwsv5N5xY/lU6ckMaO5U10My

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\eabdf7c5f8042e1cc046903839e14a67_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\eabdf7c5f8042e1cc046903839e14a67_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 244
        3⤵
        • Program crash
        PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1696-0-0x0000000013140000-0x000000001323B000-memory.dmp

    Filesize

    1004KB

  • memory/1696-4-0x00000000131FC000-0x00000000131FD000-memory.dmp

    Filesize

    4KB

  • memory/1696-5-0x0000000013140000-0x000000001323B000-memory.dmp

    Filesize

    1004KB

  • memory/1696-6-0x0000000013140000-0x000000001323B000-memory.dmp

    Filesize

    1004KB

  • memory/1696-3-0x0000000013140000-0x000000001323B000-memory.dmp

    Filesize

    1004KB

  • memory/1696-2-0x0000000013140000-0x000000001323B000-memory.dmp

    Filesize

    1004KB

  • memory/1696-1-0x0000000013140000-0x000000001323B000-memory.dmp

    Filesize

    1004KB

  • memory/1696-7-0x0000000013140000-0x000000001323B000-memory.dmp

    Filesize

    1004KB