Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 08:58

General

  • Target

    12ad6ec9e8b257b741a1d3a1b366b003_JaffaCakes118.dll

  • Size

    46KB

  • MD5

    12ad6ec9e8b257b741a1d3a1b366b003

  • SHA1

    69b55a88a7157276d5824fa11739c4e14cb456d8

  • SHA256

    6611e961a1aa8c55fae357dd088103ce4def85c919f6b4c81a33ea578c29423c

  • SHA512

    2713bd8dcf8e69b645b416bcd9459006cb9254555b91fba736756f2889f66aede4f371bfb7897e58283c67cd475f194ee6d85974c95b1eebbca9a0e960a9da9e

  • SSDEEP

    384:Dqu1yv2noh9PPczxiGW7ux3ltl/DDWFwAjjJPnHJDLWDZa4/UB3tgoF6d4a7NS:+y3S9PUNWax7tK6svpXuamO3fF6db7g

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\12ad6ec9e8b257b741a1d3a1b366b003_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\12ad6ec9e8b257b741a1d3a1b366b003_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2396-0-0x0000000040960000-0x0000000040971000-memory.dmp

    Filesize

    68KB