Analysis

  • max time kernel
    95s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 02:21

General

  • Target

    0d78a733ce8b1194be5515028c2e18a2_JaffaCakes118.dll

  • Size

    70KB

  • MD5

    0d78a733ce8b1194be5515028c2e18a2

  • SHA1

    f608b90ebae3b639eb1a317aefc02b3eb6b1893e

  • SHA256

    87532831bfd6c7a2b0b4ce4b7217d28e62d3decfcae8107c4774df9e28b3208d

  • SHA512

    1298e7aad6bebd24e02d0eb8b40e8406c1f3352b6cce2d3fd9bc34a4ce2d6441c5cd829ab5916a4bc310dfac71832f1fce9b889ecd0177510c04ad68a9ea12e3

  • SSDEEP

    1536:dQ76ypVp9Fxev5ATsIrh6NqzFmC3Trb7hhkXLSVX3I1ogEyx5iDHbTDAav8IS:S75V/FxeGgmGqxmyBhgL4Iygfx5ifTRq

Score
5/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0d78a733ce8b1194be5515028c2e18a2_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:544
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0d78a733ce8b1194be5515028c2e18a2_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2488-0-0x0000000010000000-0x000000001000E000-memory.dmp

    Filesize

    56KB