Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/06/2024, 00:32
Behavioral task
behavioral1
Sample
10199818e252fa3bf47b022241f72b73_JaffaCakes118.dll
Resource
win7-20240508-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
10199818e252fa3bf47b022241f72b73_JaffaCakes118.dll
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
10199818e252fa3bf47b022241f72b73_JaffaCakes118.dll
-
Size
101KB
-
MD5
10199818e252fa3bf47b022241f72b73
-
SHA1
d153cee6b4bf2f34670f01e84a442c3e91f35e58
-
SHA256
ca817f9f026b034ae8659470164c701c43075200a0ac6155076e90ae8ca17a72
-
SHA512
855e5fbdb30bb7411878b199c698eb8d9b1cfeeddce3f097b226c5c82898cb34e38b78df2e4f51575ed0b4f3c558b49918c586aae737220c4c9bb37656d222f4
-
SSDEEP
1536:LmSQNbJE1vj8gDxkO1RaDXbou7QZlGdEF/ECvMAmYN3gV43WO2j9:LmFty1L8gDyO1Ra3oucZlAI/EGZ643e9
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3296-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3408 wrote to memory of 3296 3408 rundll32.exe 80 PID 3408 wrote to memory of 3296 3408 rundll32.exe 80 PID 3408 wrote to memory of 3296 3408 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10199818e252fa3bf47b022241f72b73_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10199818e252fa3bf47b022241f72b73_JaffaCakes118.dll,#12⤵PID:3296
-