Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:19

General

  • Target

    b4f42af8ad3262882238a946b78d5892_JaffaCakes118.dll

  • Size

    57KB

  • MD5

    b4f42af8ad3262882238a946b78d5892

  • SHA1

    8e8c44f7fa7f25ace5513e3579d15084d4ebab8b

  • SHA256

    06845c19e103cee742663204caac5ccda81ac557724b05264778d2155d539886

  • SHA512

    d07e533e7886b6f2ac06320663d366e034c76da57e785f8b14984d5fc5223c74f8972dd6f0898a9ae637f95f007fa76678a1266a3f7c5bcbe8f949bc5bdf32e8

  • SSDEEP

    1536:vNIKDP4YU6EMyDcqiZZZNihyISFIR6/JP+3CT:2qP4YU6ErtGNEKIpCT

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b4f42af8ad3262882238a946b78d5892_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:292
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b4f42af8ad3262882238a946b78d5892_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1852-1-0x0000000010000000-0x0000000010012000-memory.dmp

    Filesize

    72KB

  • memory/1852-2-0x0000000010000000-0x0000000010012000-memory.dmp

    Filesize

    72KB

  • memory/1852-0-0x0000000010000000-0x0000000010012000-memory.dmp

    Filesize

    72KB