Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 23:05
Behavioral task
behavioral1
Sample
0fdc6ecf33676ab3dd549483b2b3f285_JaffaCakes118.dll
Resource
win7-20240611-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0fdc6ecf33676ab3dd549483b2b3f285_JaffaCakes118.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
0fdc6ecf33676ab3dd549483b2b3f285_JaffaCakes118.dll
-
Size
740KB
-
MD5
0fdc6ecf33676ab3dd549483b2b3f285
-
SHA1
397f6214781c7e9de94269145eac90dcd71f5e99
-
SHA256
0480bf1cf93047a74d846fa42c749b25a54b401ad23fbd907de6f4bd6eb875c9
-
SHA512
be00790f821b6b9dd28f80b5451e474067d67f7b9204b160588fd50e7e491b953df6bba8a21454ad3374168bd7145a419b924d400a50458dac03523e613fcd17
-
SSDEEP
12288:AnHEYPYJ6nX+X384FppaIXTUhfZcYQFttDuckX+vR5Lz5R4:UEB6nGPpzTUDQjtyckOLz5R4
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2428-5-0x0000000010000000-0x0000000010163000-memory.dmp vmprotect behavioral1/memory/2428-3-0x0000000010000000-0x0000000010163000-memory.dmp vmprotect behavioral1/memory/2428-2-0x0000000010000000-0x0000000010163000-memory.dmp vmprotect behavioral1/memory/2428-1-0x0000000010000000-0x0000000010163000-memory.dmp vmprotect behavioral1/memory/2428-0-0x0000000010000000-0x0000000010163000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2428 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2428 2092 rundll32.exe 28 PID 2092 wrote to memory of 2428 2092 rundll32.exe 28 PID 2092 wrote to memory of 2428 2092 rundll32.exe 28 PID 2092 wrote to memory of 2428 2092 rundll32.exe 28 PID 2092 wrote to memory of 2428 2092 rundll32.exe 28 PID 2092 wrote to memory of 2428 2092 rundll32.exe 28 PID 2092 wrote to memory of 2428 2092 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fdc6ecf33676ab3dd549483b2b3f285_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fdc6ecf33676ab3dd549483b2b3f285_JaffaCakes118.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2428
-