Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 09:43
Behavioral task
behavioral1
Sample
07c6a3d0f274d714d8fb95b0956e5c1a_JaffaCakes118.dll
Resource
win7-20240508-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
07c6a3d0f274d714d8fb95b0956e5c1a_JaffaCakes118.dll
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
07c6a3d0f274d714d8fb95b0956e5c1a_JaffaCakes118.dll
-
Size
11KB
-
MD5
07c6a3d0f274d714d8fb95b0956e5c1a
-
SHA1
2289b0135685224c96edb6cfaeae212e9178bf0c
-
SHA256
3525741120dda2e4d6e2a7b7c7651c1033f3fcddffff7b1297893631221cc3e9
-
SHA512
512176219b821c7530a23a75aa7d6f50bf977ce00aae31727c5a5114dab3d74f67618e216974243b25cee2301454e20d191ef4f803cd288aa6a3f946566f00d2
-
SSDEEP
192:nQYvA5+aGWwcWhofOHrYHXfis3sv5wRnWrbRVJ72GhRJWJeW7:nzvAoHTBaFP6v5wd8bRVZlWQW7
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2456-0-0x0000000010000000-0x000000001000B000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2456 2436 rundll32.exe 28 PID 2436 wrote to memory of 2456 2436 rundll32.exe 28 PID 2436 wrote to memory of 2456 2436 rundll32.exe 28 PID 2436 wrote to memory of 2456 2436 rundll32.exe 28 PID 2436 wrote to memory of 2456 2436 rundll32.exe 28 PID 2436 wrote to memory of 2456 2436 rundll32.exe 28 PID 2436 wrote to memory of 2456 2436 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07c6a3d0f274d714d8fb95b0956e5c1a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07c6a3d0f274d714d8fb95b0956e5c1a_JaffaCakes118.dll,#12⤵PID:2456
-