Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 16:44
Behavioral task
behavioral1
Sample
ede47a1d594092179877cce2224b2370_JaffaCakes118.dll
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ede47a1d594092179877cce2224b2370_JaffaCakes118.dll
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
ede47a1d594092179877cce2224b2370_JaffaCakes118.dll
-
Size
88KB
-
MD5
ede47a1d594092179877cce2224b2370
-
SHA1
79d0ae86f220c8234e6c5c8d35b792d146aed6e9
-
SHA256
9a547819e38b420f16c01185218b5aadf242004d4a31b1f13d9bdfbb8eb3f9a9
-
SHA512
6eaa1ea16ae20e236e66983202763cfdd735590c31836f963a52a8356681353bb6830f51159e6cb2fa643c998af8b8864f9c0afe63753084afa10cd0a8fdaf57
-
SSDEEP
1536:9QQioPups17wZsxAKHckvcmwqfR6qPJj9dfjhL2jWT0XU:9QeuG1cZsxekvtwsR6qRJ5NL2yT0XU
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 4932 rundll32.exe 63 4932 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NDAYO = "C:\\Windows\\SysWOW64\\rundll32.exe" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4116 wrote to memory of 4932 4116 rundll32.exe 85 PID 4116 wrote to memory of 4932 4116 rundll32.exe 85 PID 4116 wrote to memory of 4932 4116 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ede47a1d594092179877cce2224b2370_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ede47a1d594092179877cce2224b2370_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Adds Run key to start application
PID:4932
-