Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 20:57

General

  • Target

    0c6e04fa47feb40760feb1800bed425d_JaffaCakes118.dll

  • Size

    16KB

  • MD5

    0c6e04fa47feb40760feb1800bed425d

  • SHA1

    86580399de9ae53e58d5bc81f960b2a7683765bc

  • SHA256

    11d5008d965f9e3c0cf39de64c97c3df6cc45bfc19fbe38904fe9d2a2be2e6ee

  • SHA512

    1bc132f659a9b3e364a7df9ec62044595b0b2ad96e64103b44e7cbcb203b90dc4358f702c7d854e39c10de86e65f077a2210b76f97f1325e459ad9b0f6653be9

  • SSDEEP

    384:ILc4Pkd8ukimnxHjaXsy5taK9/W6Ac2PU8F:2c41tja75P9H2sk

Score
5/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0c6e04fa47feb40760feb1800bed425d_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0c6e04fa47feb40760feb1800bed425d_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2404-0-0x0000000072B00000-0x0000000072B10000-memory.dmp

    Filesize

    64KB