Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 19:53

General

  • Target

    ec146b900cf7c93dcd9dcb2797d4e483_JaffaCakes118.dll

  • Size

    30KB

  • MD5

    ec146b900cf7c93dcd9dcb2797d4e483

  • SHA1

    0b2b7699aa62169352592d1f3143b2ef0c501e09

  • SHA256

    8b157414a3646b871ca30209774f9c398325c23910eb60093c69daa10fec4bfa

  • SHA512

    4bca903d5a3b32eddc5be6497395701506e8290534619d0939ebe20a01ec3e1ba20fb7f5efdf581b946d897eacdc3666cbe03e2c3443b0a05a3c1395fb12b6e8

  • SSDEEP

    384:KNNe06t9hchQU8PUojfyDoX626hYvUc7YUv+mnPfQ8WIHjWMqtD:+eP9hVV8Yvlv3nWwyMqt

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\ec146b900cf7c93dcd9dcb2797d4e483_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\ec146b900cf7c93dcd9dcb2797d4e483_JaffaCakes118.dll
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads