Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 01:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
102f7c855a3bc990285187b74d7b3363_JaffaCakes118.dll
Resource
win7-20240220-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
102f7c855a3bc990285187b74d7b3363_JaffaCakes118.dll
Resource
win10v2004-20240611-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
102f7c855a3bc990285187b74d7b3363_JaffaCakes118.dll
-
Size
15KB
-
MD5
102f7c855a3bc990285187b74d7b3363
-
SHA1
d03fd9ae76e889c378ddb31f77133b8babb11dba
-
SHA256
8743106f3205375daa23e5e67a8c91d558cbdf51ef0aaf4482025e7e02a45f6f
-
SHA512
0a28bea3504a0273ae0957f4200745473b7cccff51a9f5abf37b490cd257369df44332aedb7c3c07b020c34ed38e43fa03b8338d94f9120ecdf8792fddf9fcfc
-
SSDEEP
192:oOwpBLXPrw6dac3/s2sH9d9FX4P3ckgUw9:OPLXPUK/sddn4P3j
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1528 rundll32.exe 1528 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1528 1340 rundll32.exe 82 PID 1340 wrote to memory of 1528 1340 rundll32.exe 82 PID 1340 wrote to memory of 1528 1340 rundll32.exe 82 PID 1528 wrote to memory of 3420 1528 rundll32.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3420
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\102f7c855a3bc990285187b74d7b3363_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\102f7c855a3bc990285187b74d7b3363_JaffaCakes118.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528
-
-