Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 23:05
Behavioral task
behavioral1
Sample
0fdc6ecf33676ab3dd549483b2b3f285_JaffaCakes118.dll
Resource
win7-20240611-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0fdc6ecf33676ab3dd549483b2b3f285_JaffaCakes118.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
0fdc6ecf33676ab3dd549483b2b3f285_JaffaCakes118.dll
-
Size
740KB
-
MD5
0fdc6ecf33676ab3dd549483b2b3f285
-
SHA1
397f6214781c7e9de94269145eac90dcd71f5e99
-
SHA256
0480bf1cf93047a74d846fa42c749b25a54b401ad23fbd907de6f4bd6eb875c9
-
SHA512
be00790f821b6b9dd28f80b5451e474067d67f7b9204b160588fd50e7e491b953df6bba8a21454ad3374168bd7145a419b924d400a50458dac03523e613fcd17
-
SSDEEP
12288:AnHEYPYJ6nX+X384FppaIXTUhfZcYQFttDuckX+vR5Lz5R4:UEB6nGPpzTUDQjtyckOLz5R4
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5072-2-0x0000000010000000-0x0000000010163000-memory.dmp vmprotect behavioral2/memory/5072-0-0x0000000010000000-0x0000000010163000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5072 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2944 wrote to memory of 5072 2944 rundll32.exe 81 PID 2944 wrote to memory of 5072 2944 rundll32.exe 81 PID 2944 wrote to memory of 5072 2944 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fdc6ecf33676ab3dd549483b2b3f285_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fdc6ecf33676ab3dd549483b2b3f285_JaffaCakes118.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5072
-