Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2024 23:03

General

  • Target

    f94f17ecddf492a4b67ca8cf4046ad9e_JaffaCakes118.dll

  • Size

    23KB

  • MD5

    f94f17ecddf492a4b67ca8cf4046ad9e

  • SHA1

    11bd42b8862a0db3abf29e01d797e125d711e526

  • SHA256

    1366a85d3b8371d3073a710b19b38a3871569f157dd37fe916fb621eea5f2367

  • SHA512

    548dcab1f3eb46f4072f65aae99c4b2c388829ae911c43757a3158302d864a7c75b300742804129ef046ed98d857b66965382bfd24a66cb3b31257036fab6235

  • SSDEEP

    384:jjaUxz0ClwXqd+1egQKZryiH+Af1Rc8KgGwysAzmPAA6ytB5e:aRCl+qdSHQOuM+Af1lzyBmnj5

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f94f17ecddf492a4b67ca8cf4046ad9e_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f94f17ecddf492a4b67ca8cf4046ad9e_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads