Analysis

  • max time kernel
    95s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 14:47

General

  • Target

    f00616f8f6c6e7f23db3c95afa08434c_JaffaCakes118.dll

  • Size

    53KB

  • MD5

    f00616f8f6c6e7f23db3c95afa08434c

  • SHA1

    9ee7a88675984d6deefcebdc321a636c8c56f0a3

  • SHA256

    49902855763fba86711c33632495f982846be2f8de6ac22fba11c7b70ecab9d8

  • SHA512

    55d1322434e7edbd184dc3048ae34728e8312b1dc9700b76b15fc86ff24e33c1d700daac17f60044e720f617a50698247bb255bc9e694efba7f781143ac905b1

  • SSDEEP

    768:7JxOFaIPpozDeNU30ZhZTaFT4h7s8/GYtzTOHk5QXiIpqL5z4lq4KNd:dw7GuUEZhkFTMb9hTOHlZIM3KNd

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f00616f8f6c6e7f23db3c95afa08434c_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f00616f8f6c6e7f23db3c95afa08434c_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1120-0-0x0000000010000000-0x0000000010014000-memory.dmp

    Filesize

    80KB