Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 05:41

General

  • Target

    2be06e6373ce1ac1aa1d50a134dfff19_JaffaCakes118.dll

  • Size

    316KB

  • MD5

    2be06e6373ce1ac1aa1d50a134dfff19

  • SHA1

    c1a99db01fe4f0727ba0474b28635ddc2ed88953

  • SHA256

    0eb73ea3abde566ec7fb59b67b1454fbb7246870d6c07e6aa244348cd4e29d89

  • SHA512

    410378c225efd23da181421e6164ce4dc691161a4eecbbe4c4c1e1ca266b64af51abb04cd0f11ad8e00d9a58cd187754ac6d862e5fe6ebb8afd42c9dd4e84d83

  • SSDEEP

    3072:0uwDCAqn4PaLh1KO8CgvQe12qrU/2Y3NjwHLKePembdejGdvUbBP466JoHfyln1X:D/n4PatvAE26MWeWmBeiabBZ6lnzyM

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2be06e6373ce1ac1aa1d50a134dfff19_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\2be06e6373ce1ac1aa1d50a134dfff19_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads