Analysis

  • max time kernel
    140s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 13:35

General

  • Target

    0604a92e916b184543bfeb83943f327d_JaffaCakes118.dll

  • Size

    819KB

  • MD5

    0604a92e916b184543bfeb83943f327d

  • SHA1

    99055b7c2ac0a42e6b4fc45d359fcb7577e4a6d6

  • SHA256

    f64ad7a74ce79342deb218ec92e9dc3b149d9ded44806f82372368813da2bce3

  • SHA512

    426a72009f8f80d52c75a48c707bb382e702f4ac09428746760a65ed55e244a46457fe625a8df00ad008ae538a1d0154db345dfb994032421483921516c1ceda

  • SSDEEP

    24576:KGR2luVVnhdxB7k5OVFD6/SBpmdW4mW8b:nR2kLbxNk5e6/SBp9h

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0604a92e916b184543bfeb83943f327d_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0604a92e916b184543bfeb83943f327d_JaffaCakes118.dll,#1
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1936

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1936-5-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/1936-3-0x00000000749E0000-0x0000000074E4A000-memory.dmp

          Filesize

          4.4MB

        • memory/1936-2-0x00000000749E0000-0x0000000074E4A000-memory.dmp

          Filesize

          4.4MB

        • memory/1936-1-0x0000000074E50000-0x00000000752BA000-memory.dmp

          Filesize

          4.4MB

        • memory/1936-0-0x0000000074E50000-0x00000000752BA000-memory.dmp

          Filesize

          4.4MB

        • memory/1936-6-0x00000000749E0000-0x0000000074E4A000-memory.dmp

          Filesize

          4.4MB

        • memory/1936-8-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB