Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 09:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
07ce060934a9106a3e135c33ebd64e9e_JaffaCakes118.dll
Resource
win7-20240419-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
07ce060934a9106a3e135c33ebd64e9e_JaffaCakes118.dll
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
07ce060934a9106a3e135c33ebd64e9e_JaffaCakes118.dll
-
Size
28KB
-
MD5
07ce060934a9106a3e135c33ebd64e9e
-
SHA1
e9d0fdb9d91ec314778f45065642066cbd4c575b
-
SHA256
20efc37efcb36bc4a7cdf75ff667d3193959bf1858a4c115fd4301ca11ce8ddb
-
SHA512
c3c17c911464deb7be6daf3339738fb53e89a93f0b58eb5971d6ffbbd7aced4d88ff61ab2ac973f8c1f6dafdf9e4dc505d17607b0b8b9be822b98b0b8a320f8a
-
SSDEEP
192:EmUk5kULV+jC9LDADPF9+qQ/1nwzJvZvdW9+2Cp92xR43beMs7ui4jrh:EmFDR+jCpAJ9+qQ/1nZMHeMsCj
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ǧǧ¾²Ìý = "C:\\Windows\\SysWOW64\\TTPlayer.exe" rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 744 wrote to memory of 3300 744 rundll32.exe 82 PID 744 wrote to memory of 3300 744 rundll32.exe 82 PID 744 wrote to memory of 3300 744 rundll32.exe 82 PID 3300 wrote to memory of 2628 3300 rundll32.exe 83 PID 3300 wrote to memory of 2628 3300 rundll32.exe 83 PID 3300 wrote to memory of 2628 3300 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07ce060934a9106a3e135c33ebd64e9e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07ce060934a9106a3e135c33ebd64e9e_JaffaCakes118.dll,#12⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\SysWOW64\Pidalce.dll",DPldalic3⤵PID:2628
-
-