Analysis
-
max time kernel
125s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 00:01
Behavioral task
behavioral1
Sample
04d95c5286b35f501375e898dbf18261_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
04d95c5286b35f501375e898dbf18261_JaffaCakes118.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
04d95c5286b35f501375e898dbf18261_JaffaCakes118.dll
-
Size
16KB
-
MD5
04d95c5286b35f501375e898dbf18261
-
SHA1
26e2a1143af7d4b99e2dacc45617a44df791bbdc
-
SHA256
c32af38d631cb5cac836cb4e0fbdd5656f2ccacca33b6f5c3983a9750aadc943
-
SHA512
b21e064f09926820dc3435d2fd2a0fa78696e69f28c6a6c13f652f3077348e5ccf7b1df40f82475cb082d3e619280f78caee08f5abb79d1698fbb4d5129403f7
-
SSDEEP
192:lKu/Hv03P/V79cJHOZE5VdBgiXtVuvOfKTjUAGwhKDyCq8keNjneFFFwnnxna+xs:Hv03gQ65ySyOAFKOD81Njef+jS
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/860-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3608 wrote to memory of 860 3608 rundll32.exe 88 PID 3608 wrote to memory of 860 3608 rundll32.exe 88 PID 3608 wrote to memory of 860 3608 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04d95c5286b35f501375e898dbf18261_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04d95c5286b35f501375e898dbf18261_JaffaCakes118.dll,#12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4100,i,13544508926340531097,6671217806016090640,262144 --variations-seed-version --mojo-platform-channel-handle=4020 /prefetch:81⤵PID:3604