Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 12:53
Static task
static1
Behavioral task
behavioral1
Sample
07b60dc343df2ab67d7a586d0a6a5be2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07b60dc343df2ab67d7a586d0a6a5be2_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
IP.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
IP.dll
Resource
win10v2004-20240419-en
General
-
Target
IP.dll
-
Size
89KB
-
MD5
38ed71d99dd2bb013c4bc8e065d87e3e
-
SHA1
e11be1e6647911705a90ec0f55787d2dba3e6ca0
-
SHA256
286069d12c8f12a00aef558d02426dfdbe3a6337b05dea53b70a3d3cfcf49ff9
-
SHA512
0480789002f9dd3bc52e49eb534471ab1db81be9fd94522373d14a81735aea7e20a995748edc131b0ec6ba49b420c56a030e955cffdb45ba410392dc7a8c0983
-
SSDEEP
1536:N+/uD66eFQO8mxmi3dFDhoKAWZbpHDd6wW/YPHb5rgakGRbiTfWS4t2Ag35DkLg8:N+ao3n2I6wW/YPb1DOTfWS0VgpJ8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2924 wrote to memory of 2132 2924 rundll32.exe rundll32.exe PID 2924 wrote to memory of 2132 2924 rundll32.exe rundll32.exe PID 2924 wrote to memory of 2132 2924 rundll32.exe rundll32.exe PID 2924 wrote to memory of 2132 2924 rundll32.exe rundll32.exe PID 2924 wrote to memory of 2132 2924 rundll32.exe rundll32.exe PID 2924 wrote to memory of 2132 2924 rundll32.exe rundll32.exe PID 2924 wrote to memory of 2132 2924 rundll32.exe rundll32.exe