Analysis

  • max time kernel
    95s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 13:47

General

  • Target

    eb75da004455163d58cb0e95da446484_JaffaCakes118.dll

  • Size

    40KB

  • MD5

    eb75da004455163d58cb0e95da446484

  • SHA1

    10f1137e9157b2bef3a5a61c1487eaa1b4458ec6

  • SHA256

    1d4cb30df1aab29623c4ba446e146019d91ef3bb14eb5b331b17227be759ba40

  • SHA512

    18db2a277edb5262b7f6d44cfc1efa8f5df8fb6dd00d6468e5593926d1811bb863a09e77aa8cc9cdf56557f2c15a3416dcc61b66a07a680f50825c1bcef67bda

  • SSDEEP

    768:NLY9qwqOV9h2N2Px2t2B2d2R2A0jTnRpRJ+BHFbLNO/DloKURp4jB+b:N89qwqOV9h2N2J2t2B2d2R2A0jTn3Rkk

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\eb75da004455163d58cb0e95da446484_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4648
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\eb75da004455163d58cb0e95da446484_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads