Analysis

  • max time kernel
    94s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2025 04:33

General

  • Target

    JaffaCakes118_174835322d4d001d099d2fcfbd73162d.dll

  • Size

    56KB

  • MD5

    174835322d4d001d099d2fcfbd73162d

  • SHA1

    20af7091448259c6af3701a11a25ba2331825980

  • SHA256

    484101e6b5c85f144d246fac5d1c80a74012f0b7e9780a70685c72750038c651

  • SHA512

    7dea85db164be8b8fbde95fd0a8ef6cbb5fdecdad83c9418d6053ee796bc274876e8e9a80c238d6262f5f48656b7213c82a25eb6111ac678364c3cfcf21479e6

  • SSDEEP

    1536:T5V09KTh1/EO7VSsjI4Zhky7l96mY1D39:TjOe8mkulbY1D39

Score
5/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_174835322d4d001d099d2fcfbd73162d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3336
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_174835322d4d001d099d2fcfbd73162d.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4232-0-0x0000000010000000-0x000000001000E000-memory.dmp

    Filesize

    56KB