Analysis
-
max time kernel
51s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 11:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
05b86a744da20e830e0ec377378f6bf3_JaffaCakes118.dll
Resource
win7-20240611-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
05b86a744da20e830e0ec377378f6bf3_JaffaCakes118.dll
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
05b86a744da20e830e0ec377378f6bf3_JaffaCakes118.dll
-
Size
56KB
-
MD5
05b86a744da20e830e0ec377378f6bf3
-
SHA1
7e0ecf653cd8646da21488f20a6ae8d2acb1e876
-
SHA256
1fc74e2a597ed91de1a224b4c1cd181d148bfbeeaa0da672e99238629fdec356
-
SHA512
0f51874e257b9e8f593c55465644ab88465f1e15b3a313511cebb80e293076c868f1569bd8d5a721f7fc00b13e175e486983c73aa7978148ae702dd42464d620
-
SSDEEP
768:TGjbRNVgGGhNgrT3VsN55cJrkYpM0bDssoiGgqcnV:S2Ne3VAcJM0ailqcnV
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2444 rundll32.exe 2444 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4928 wrote to memory of 2444 4928 rundll32.exe 82 PID 4928 wrote to memory of 2444 4928 rundll32.exe 82 PID 4928 wrote to memory of 2444 4928 rundll32.exe 82 PID 2444 wrote to memory of 3500 2444 rundll32.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05b86a744da20e830e0ec377378f6bf3_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05b86a744da20e830e0ec377378f6bf3_JaffaCakes118.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2444
-
-