Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 04:52
Behavioral task
behavioral1
Sample
e94425d9f44deb32b57d9fd755b18de7_JaffaCakes118.dll
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
e94425d9f44deb32b57d9fd755b18de7_JaffaCakes118.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
e94425d9f44deb32b57d9fd755b18de7_JaffaCakes118.dll
-
Size
78KB
-
MD5
e94425d9f44deb32b57d9fd755b18de7
-
SHA1
75f64ba3909b17d1d7668a911c8b433b8f318f53
-
SHA256
b0adda307d9cb9781fc6465bcd743c49f974653e6f0e67aba9c815c586f9e865
-
SHA512
286be33ec8153bbd0c4593733beed98b62fd6c38d563d8efa937904ccfc9694554dee5e39785e5010fd97f3910b0fc0c28f0e3686367db9bac41a4fb21be6dda
-
SSDEEP
1536:4yV5wz0Sks0F6uXOeFnToIfAtqi05+++++++++++YO++++++M++w++++++++FNDV:7V5w6svuXOetTBfAtqi0mNDzjel6dWi3
Score
8/10
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Workstation\Parameters\ServiceDll rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2228 wrote to memory of 4252 2228 rundll32.exe 86 PID 2228 wrote to memory of 4252 2228 rundll32.exe 86 PID 2228 wrote to memory of 4252 2228 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e94425d9f44deb32b57d9fd755b18de7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e94425d9f44deb32b57d9fd755b18de7_JaffaCakes118.dll,#12⤵
- Sets DLL path for service in the registry
PID:4252
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k krnlsrvc1⤵PID:4360