Resubmissions
07-08-2024 18:16
240807-wwjlqs1hjm 1007-08-2024 18:14
240807-wvf48a1grn 1028-05-2024 08:02
240528-jxc45abh5s 10Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 08:02
Static task
static1
Behavioral task
behavioral1
Sample
7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll
-
Size
166KB
-
MD5
7c421ca94c441a4b74d364f952f8739c
-
SHA1
e5de78ae8db1aa78e00c1fa1eb5687cd1519843c
-
SHA256
7afc7a311740da58cb0b7d6c43e28b1ddb6fce9c67614e74902e552b330287b0
-
SHA512
0eb45486ab306562c267eba5eae7f1b8d6d551b83603d136865c2e1c7c90abb0067effc4a358649846dc89ef37ad9ff266922223f318a631d3f457792f1df4d2
-
SSDEEP
3072:JLFrb30BRtBZZg+i2ayyYOCWGPyLydrkxMT3QDhqtUczTajkz+XHUU:NJ0BXScFyfC3Hd4ygV6oPHU
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2100 1964 rundll32.exe 28 PID 1964 wrote to memory of 2100 1964 rundll32.exe 28 PID 1964 wrote to memory of 2100 1964 rundll32.exe 28 PID 1964 wrote to memory of 2100 1964 rundll32.exe 28 PID 1964 wrote to memory of 2100 1964 rundll32.exe 28 PID 1964 wrote to memory of 2100 1964 rundll32.exe 28 PID 1964 wrote to memory of 2100 1964 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll,#12⤵PID:2100
-