Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 11:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
05b86a744da20e830e0ec377378f6bf3_JaffaCakes118.dll
Resource
win7-20240611-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
05b86a744da20e830e0ec377378f6bf3_JaffaCakes118.dll
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
05b86a744da20e830e0ec377378f6bf3_JaffaCakes118.dll
-
Size
56KB
-
MD5
05b86a744da20e830e0ec377378f6bf3
-
SHA1
7e0ecf653cd8646da21488f20a6ae8d2acb1e876
-
SHA256
1fc74e2a597ed91de1a224b4c1cd181d148bfbeeaa0da672e99238629fdec356
-
SHA512
0f51874e257b9e8f593c55465644ab88465f1e15b3a313511cebb80e293076c868f1569bd8d5a721f7fc00b13e175e486983c73aa7978148ae702dd42464d620
-
SSDEEP
768:TGjbRNVgGGhNgrT3VsN55cJrkYpM0bDssoiGgqcnV:S2Ne3VAcJM0ailqcnV
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1720 rundll32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1720 2228 rundll32.exe 28 PID 2228 wrote to memory of 1720 2228 rundll32.exe 28 PID 2228 wrote to memory of 1720 2228 rundll32.exe 28 PID 2228 wrote to memory of 1720 2228 rundll32.exe 28 PID 2228 wrote to memory of 1720 2228 rundll32.exe 28 PID 2228 wrote to memory of 1720 2228 rundll32.exe 28 PID 2228 wrote to memory of 1720 2228 rundll32.exe 28 PID 1720 wrote to memory of 1336 1720 rundll32.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1336
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05b86a744da20e830e0ec377378f6bf3_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05b86a744da20e830e0ec377378f6bf3_JaffaCakes118.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1720
-
-