Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 04:23
Behavioral task
behavioral1
Sample
f506d9304d8bf47b9f6d2347730baf32_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
f506d9304d8bf47b9f6d2347730baf32_JaffaCakes118.dll
Resource
win10v2004-20240412-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
f506d9304d8bf47b9f6d2347730baf32_JaffaCakes118.dll
-
Size
105KB
-
MD5
f506d9304d8bf47b9f6d2347730baf32
-
SHA1
3c4acaa9a1bb2477219c6a9e7c478a7d2613250c
-
SHA256
7606ede5d7fbf2f42807384bb83e3397f5e8d17e8498ab769bd86d3ef6d52acf
-
SHA512
21baa503996feef95dfdafc3400f4855171eb901993e22d0e53f8d92568cba7134bd52dcaddd14ca3ed06f474b7b492590cd0aa49d62eef3bc7a6418d87fc7b6
-
SSDEEP
1536:Nr1O1I7ZMTSrnTtanLJNUv7R0WUkhIxjCuH8G5FYdrn5tHojugH97stqJlcVl:N9KTSrnInPUDRP3Wxc8uHojUqJl+
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4540-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4272 wrote to memory of 4540 4272 rundll32.exe 82 PID 4272 wrote to memory of 4540 4272 rundll32.exe 82 PID 4272 wrote to memory of 4540 4272 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f506d9304d8bf47b9f6d2347730baf32_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f506d9304d8bf47b9f6d2347730baf32_JaffaCakes118.dll,#12⤵PID:4540
-