Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 10:35
Behavioral task
behavioral1
Sample
fa1d4cf1f198e366dc0342433eaf0326_JaffaCakes118.dll
Resource
win7-20240220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
fa1d4cf1f198e366dc0342433eaf0326_JaffaCakes118.dll
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
fa1d4cf1f198e366dc0342433eaf0326_JaffaCakes118.dll
-
Size
32KB
-
MD5
fa1d4cf1f198e366dc0342433eaf0326
-
SHA1
6f9fd42bfa04ce2f05164e5ace30feda915bbf31
-
SHA256
55913c3412ef4cddaff43291d7d4e88f969092d6f6254bc317c586a20bc198cb
-
SHA512
ebf4a2bcfe3ce25bf987228fba1a50e42538ec75d4c92b16d1f87ecc868d9931372e0d520375215587639d9b9abae559ad9233ae54af382d6c0f5127ddcee158
-
SSDEEP
768:2Fdgtn9upt4OwE6DOcuwSI7v3ZJlGlt3/ZtoAkXIY:4gHgwEoG3I7RJlWhtkX
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2972-0-0x0000000010000000-0x0000000010018000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2972 2360 rundll32.exe 86 PID 2360 wrote to memory of 2972 2360 rundll32.exe 86 PID 2360 wrote to memory of 2972 2360 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa1d4cf1f198e366dc0342433eaf0326_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa1d4cf1f198e366dc0342433eaf0326_JaffaCakes118.dll,#12⤵PID:2972
-