Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 18:42
Behavioral task
behavioral1
Sample
0a324286fd8a325c9a2d928a8974c8f6_JaffaCakes118.dll
Resource
win7-20240508-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0a324286fd8a325c9a2d928a8974c8f6_JaffaCakes118.dll
Resource
win10v2004-20240611-en
2 signatures
150 seconds
General
-
Target
0a324286fd8a325c9a2d928a8974c8f6_JaffaCakes118.dll
-
Size
68KB
-
MD5
0a324286fd8a325c9a2d928a8974c8f6
-
SHA1
ce9e97306e894a1b3e37fe123f957f9a6d8e4dae
-
SHA256
c04c5ab6f3e92c19a6d62832984f0b16eac105420e9146a387c6561978afcdd2
-
SHA512
4003ff464f687e86b576a6c12736ed0bbafe1314a6d15ec4eccfd933e7891923a98a5cc94cf016654d680aa2bc5e08f3d8d7687022008d29feb13520c42e78b2
-
SSDEEP
768:IdTz1r1bTx00rJ3Ou/zVEZl16CyWQcmjTpI7bDTbHbzQvl+ov0rKkwMNj+uVZOvP:INZZrhnhel1xupIXbvQvpv0LLjTVMn
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4660-0-0x0000000000400000-0x0000000000430000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4444 wrote to memory of 4660 4444 rundll32.exe 83 PID 4444 wrote to memory of 4660 4444 rundll32.exe 83 PID 4444 wrote to memory of 4660 4444 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a324286fd8a325c9a2d928a8974c8f6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a324286fd8a325c9a2d928a8974c8f6_JaffaCakes118.dll,#12⤵PID:4660
-