Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 12:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ff4ef92ca7d341f8567e9d25253903cd_JaffaCakes118.dll
Resource
win7-20240215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
ff4ef92ca7d341f8567e9d25253903cd_JaffaCakes118.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
ff4ef92ca7d341f8567e9d25253903cd_JaffaCakes118.dll
-
Size
413KB
-
MD5
ff4ef92ca7d341f8567e9d25253903cd
-
SHA1
44d9f4fe38051ad96f3f43420adce3eb31abdfa2
-
SHA256
3d808ce5af99f654363684805463e6aae1466e38a276cae191adca5dd5c14894
-
SHA512
aa18c742059824de7d061f27c96efc6db8897d7f94b8232ef264f7cd357158e634bc4b6d19a9796bc368db4b5972fbba22c92cf014015684f10984914c0743ad
-
SSDEEP
6144:lLnsRoovfZFAgTXUckOqeOY5xu6IuqAlcs1wpISHvWumZj8pB6Uim4pt:Zn8oOfZug7Oxixu6Irj1vWuZBfyt
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1372 rundll32.exe 1372 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1372 rundll32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1372 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1372 1724 rundll32.exe 28 PID 1724 wrote to memory of 1372 1724 rundll32.exe 28 PID 1724 wrote to memory of 1372 1724 rundll32.exe 28 PID 1724 wrote to memory of 1372 1724 rundll32.exe 28 PID 1724 wrote to memory of 1372 1724 rundll32.exe 28 PID 1724 wrote to memory of 1372 1724 rundll32.exe 28 PID 1724 wrote to memory of 1372 1724 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff4ef92ca7d341f8567e9d25253903cd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff4ef92ca7d341f8567e9d25253903cd_JaffaCakes118.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1372
-