Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 14:59
Behavioral task
behavioral1
Sample
eb55812aa6bc798f6e1c870c0d0728b7_JaffaCakes118.dll
Resource
win7-20240319-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
eb55812aa6bc798f6e1c870c0d0728b7_JaffaCakes118.dll
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
eb55812aa6bc798f6e1c870c0d0728b7_JaffaCakes118.dll
-
Size
47KB
-
MD5
eb55812aa6bc798f6e1c870c0d0728b7
-
SHA1
936966c3f95d4ab09489a31587d903c2f43a994b
-
SHA256
388fcaddc064e8b643c5b13a92637d4000d49480276695e1da0a8c52cf5815c5
-
SHA512
26261daf9f7d4b4887e6322bccdbe2ca1776869a2a3b3417119b02893b73bc4b712d7d3f910426fd852e5fb567e3704cfccddb7b09d1ca5c8a66f7c753f666ca
-
SSDEEP
768:ywDLAK4OJUtBFKn1sJgfoP6J9oQX0TUVL//dvOb1WJnzmbQISDczxwu/+fK:ywDLAK4OWFK1ugQP6wQkIVbl0AIMjc+i
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys rundll32.exe -
resource yara_rule behavioral2/memory/4292-0-0x0000000010000000-0x0000000010021000-memory.dmp upx -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 676 Process not Found -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4536 wrote to memory of 4292 4536 rundll32.exe 85 PID 4536 wrote to memory of 4292 4536 rundll32.exe 85 PID 4536 wrote to memory of 4292 4536 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb55812aa6bc798f6e1c870c0d0728b7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb55812aa6bc798f6e1c870c0d0728b7_JaffaCakes118.dll,#12⤵
- Drops file in Drivers directory
PID:4292
-