Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 21:18

General

  • Target

    14f2e90ff6477e68a83a2f1a1094d000_JaffaCakes118.dll

  • Size

    744KB

  • MD5

    14f2e90ff6477e68a83a2f1a1094d000

  • SHA1

    a6807dae64f72c0f70bea91dc8b7305fa867b8a5

  • SHA256

    54afdfb0e7fa6e5c48cf17545412343e1978bc9d46ada10c6d8b4bb181ef61e9

  • SHA512

    44c00dc9d4be887df317c9bd8f061cd096995182f67f761a582022b5cbb6fb67086bfb5f20adbe055fa84add4e51b535e6e906f414ef07163d57e211330967f2

  • SSDEEP

    12288:2Scqlaloty94XS048OQ3s/s4C8GThV003/haMZdnk32o7vyiQ:XHaSg6XR4S3CsBnhm0Ph7ZO32o7vyiQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\14f2e90ff6477e68a83a2f1a1094d000_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\14f2e90ff6477e68a83a2f1a1094d000_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2356

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2356-0-0x00000000757C7000-0x00000000757E8000-memory.dmp

          Filesize

          132KB

        • memory/2356-1-0x00000000757C7000-0x00000000757E8000-memory.dmp

          Filesize

          132KB