Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 13:26

General

  • Target

    efe44b581127d2c648699ab0644d2233_JaffaCakes118.dll

  • Size

    87KB

  • MD5

    efe44b581127d2c648699ab0644d2233

  • SHA1

    a594d3a18469bc1b372257cc17b9432696ac0232

  • SHA256

    72dc550ca9dfc5c1ffda25dcef6188d571b1cff86dfad095039673ac34aa8632

  • SHA512

    88b8ce34896b4bb8860a375ecce5b6abdc75f1ca33c9ab20b0b57adcb7a8bce477e8b44e8c61e31769cfdf819b6e4f04d377ef493f3922b2d37a3547d4c04363

  • SSDEEP

    1536:4uIyQ3tAKhfOcn+iJTmR04G3XDkrFbEV:1IxaKsW+i5mVGsEV

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\efe44b581127d2c648699ab0644d2233_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\efe44b581127d2c648699ab0644d2233_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 264
        3⤵
        • Program crash
        PID:2796

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads