Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 14:54

General

  • Target

    526c031f3ca8e4364ca75cd82d4ff410_JaffaCakes118.dll

  • Size

    77KB

  • MD5

    526c031f3ca8e4364ca75cd82d4ff410

  • SHA1

    df61bace31e1ed5e17ce211deecd9257fd755ce9

  • SHA256

    a3b9aad0271748d69ca9761c9fb13ba5f9586418ab2ad44dcddb873894c3c75e

  • SHA512

    15bc714189dfe79a0dbd5d538ddf62101b1a3460ff04ac4a98c89b9810e3256a7767e7bf988f1736993edeefe2c80f8069d8c35430d1d03c8da922d0e9efc64d

  • SSDEEP

    1536:1cXwhPJ3+sJ7OGoJz9RXW6sy02z+S9VMgh1Zr5J410:1cX8BGJbWt2z+SKeZr5J410

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\526c031f3ca8e4364ca75cd82d4ff410_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:724
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\526c031f3ca8e4364ca75cd82d4ff410_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4740-0-0x0000000010009000-0x0000000010016000-memory.dmp

    Filesize

    52KB

  • memory/4740-1-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/4740-2-0x0000000001350000-0x000000000135D000-memory.dmp

    Filesize

    52KB

  • memory/4740-3-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/4740-4-0x0000000001350000-0x000000000135D000-memory.dmp

    Filesize

    52KB