Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-10-2024 20:21

General

  • Target

    70a7f624cbc42a326a86962a55effdc5_JaffaCakes118.dll

  • Size

    653KB

  • MD5

    70a7f624cbc42a326a86962a55effdc5

  • SHA1

    b220ad781005441fd68c5ddadb317e06f6d59fc8

  • SHA256

    1f0f05d048789e676422c19867821aa2ba2c3624f7f70dce71b6dadf45cc6050

  • SHA512

    a588011bcef3bfe5ca4295e033fd5dbc571c63510ff4727d871187211abeee730b286ac9aea8b5f00aaadf9b3eb91dd16d7a0ff2dcfd5fa16800dec63530f754

  • SSDEEP

    12288:1F7dIH3kMwvDn11X1Y55huw87t63KfsVc4xW5E+yYNTPkEpaedfamoR+Xz3uM4+V:1F7da3kMWz1AKEVlO9ygkEpaafsMze+V

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\70a7f624cbc42a326a86962a55effdc5_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4144
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\70a7f624cbc42a326a86962a55effdc5_JaffaCakes118.dll
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads