Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 21:00
Behavioral task
behavioral1
Sample
0078a595781a7968e30cadfd15e54ad5_JaffaCakes118.dll
Resource
win7-20240220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0078a595781a7968e30cadfd15e54ad5_JaffaCakes118.dll
Resource
win10v2004-20240611-en
3 signatures
150 seconds
General
-
Target
0078a595781a7968e30cadfd15e54ad5_JaffaCakes118.dll
-
Size
91KB
-
MD5
0078a595781a7968e30cadfd15e54ad5
-
SHA1
426287e34330fde24d87e8bfaf328a176b98f2f6
-
SHA256
58ee4c7f9a21bd3d235ca36d5c99787c2cf677ecb1c80903caa8ab8fe85a419d
-
SHA512
4107bbb10c0192f438dd4e608f5a4a59a068dea62980e7a1f4d3c8db5cb1974d541ec18177d2422b05c4fa5367ee13f3ac55887d84265fb7d5cba4c8d11d6c3c
-
SSDEEP
1536:LFImUp2UtdOuTe2650Tep+cZX3Uf6V8d8TedKLksIeo:VULzOuCryTep+eX3G6V8qSdKLksIe
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 644 -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3012 wrote to memory of 3804 3012 rundll32.exe rundll32.exe PID 3012 wrote to memory of 3804 3012 rundll32.exe rundll32.exe PID 3012 wrote to memory of 3804 3012 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0078a595781a7968e30cadfd15e54ad5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0078a595781a7968e30cadfd15e54ad5_JaffaCakes118.dll,#12⤵
- Drops file in Drivers directory
PID:3804