Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2024, 20:28
Behavioral task
behavioral1
Sample
c1fe63710ef985bc92d7da84fb09d955_JaffaCakes118.dll
Resource
win7-20240220-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c1fe63710ef985bc92d7da84fb09d955_JaffaCakes118.dll
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
c1fe63710ef985bc92d7da84fb09d955_JaffaCakes118.dll
-
Size
1.0MB
-
MD5
c1fe63710ef985bc92d7da84fb09d955
-
SHA1
9610905de355d01e0a641e63c9dd1628a0daac68
-
SHA256
29f0cbfa77d84dbcb56591b10918e7bc1c1a7a4b9a7f8354796dae2450cb739d
-
SHA512
5c622907ad467a74baa697f77eb156a9d87d0df85614c95e1e27f8a7e17192e98e58253e881c5a5006be5b3102052592a93836495e43eabeb7304b4029310866
-
SSDEEP
24576:p8fY1s+upoTvcT89MP65/3yp+KuOpRcwWgdivG:19bT0TByA+6Q
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/856-0-0x0000000075660000-0x000000007566D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 916 wrote to memory of 856 916 rundll32.exe 85 PID 916 wrote to memory of 856 916 rundll32.exe 85 PID 916 wrote to memory of 856 916 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1fe63710ef985bc92d7da84fb09d955_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1fe63710ef985bc92d7da84fb09d955_JaffaCakes118.dll,#12⤵PID:856
-