Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 14:08
Behavioral task
behavioral1
Sample
4b781dcadf0d61df0af99ad8e380976b_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
4b781dcadf0d61df0af99ad8e380976b_JaffaCakes118.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
4b781dcadf0d61df0af99ad8e380976b_JaffaCakes118.dll
-
Size
3.1MB
-
MD5
4b781dcadf0d61df0af99ad8e380976b
-
SHA1
5747188c9385d49bad587ebd9d6d382b226eaf81
-
SHA256
d45ac4465debaea3183206fac238b0c5279257c8ac1a5bb1762086a20f0fdd7d
-
SHA512
2931aeef29233d4bbd93bfd2ea7972ab0ac4df0366b1721def8d57487517d16bc183ac76525f93e42d6839d4e57763cb60940ce825f1a1ed24b19aecb897c0d4
-
SSDEEP
98304:pr+n3+p4a6yy3pbw9ctF6jCQ8lNZ9T9sK/k:pr+nTaGw9Exz9Tn/k
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2052-31-0x00000000022F0000-0x0000000002AD1000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2052 2084 rundll32.exe 28 PID 2084 wrote to memory of 2052 2084 rundll32.exe 28 PID 2084 wrote to memory of 2052 2084 rundll32.exe 28 PID 2084 wrote to memory of 2052 2084 rundll32.exe 28 PID 2084 wrote to memory of 2052 2084 rundll32.exe 28 PID 2084 wrote to memory of 2052 2084 rundll32.exe 28 PID 2084 wrote to memory of 2052 2084 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b781dcadf0d61df0af99ad8e380976b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b781dcadf0d61df0af99ad8e380976b_JaffaCakes118.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052
-