Analysis
-
max time kernel
125s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 19:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
511b6b02204cf8e96d169a4401d1ab9d_JaffaCakes118.dll
Resource
win7-20240220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
511b6b02204cf8e96d169a4401d1ab9d_JaffaCakes118.dll
Resource
win10v2004-20240426-en
3 signatures
150 seconds
General
-
Target
511b6b02204cf8e96d169a4401d1ab9d_JaffaCakes118.dll
-
Size
7.0MB
-
MD5
511b6b02204cf8e96d169a4401d1ab9d
-
SHA1
97fb9c4a349a674f005f49f89d03cf522b040d6c
-
SHA256
a1b68d645e986decbf9cae93f6a98a228604ed9ee47911023b0d4935cc28cb94
-
SHA512
76d0ae80037f6a472e83d8c7b47697a112bb92d9ef5e7d02148c8ffd6882298d1edefceb37a61e796a19b92d643f4bcbb8cf4d100471a2779ff2cfcb0468bdfe
-
SSDEEP
196608:kbn+nq+DYEY4QuwwV1At902yu+D02yWVI7b:En+57ZTLu60n7b
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2428 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2428 rundll32.exe 2428 rundll32.exe 2428 rundll32.exe 2428 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4720 wrote to memory of 2428 4720 rundll32.exe 84 PID 4720 wrote to memory of 2428 4720 rundll32.exe 84 PID 4720 wrote to memory of 2428 4720 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\511b6b02204cf8e96d169a4401d1ab9d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\511b6b02204cf8e96d169a4401d1ab9d_JaffaCakes118.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2428
-