Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 22:56
Behavioral task
behavioral1
Sample
17d8189872220453bde640d02f04eec0_JaffaCakes118.dll
Resource
win7-20240419-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
17d8189872220453bde640d02f04eec0_JaffaCakes118.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
17d8189872220453bde640d02f04eec0_JaffaCakes118.dll
-
Size
67KB
-
MD5
17d8189872220453bde640d02f04eec0
-
SHA1
e7feef96d7668af0b841a1e6bd0c81fcfa6966e5
-
SHA256
d35b646ffa0b930d2a20ecfb53a74063bb6bd0c05b29b13384a5e17e143c99c4
-
SHA512
93da9908fd7892391c7eb6d6d1c448ed9af8c68cac15d8637d2b2a5b140794ee1fbdb7e61cce978c2d5d718ee1a131e231076083bc5259f990e677b08262d41e
-
SSDEEP
1536:hXGa7ReQCp7lsSaeannogiSQGf+2G92BQyBcWaU2Lvc58:r7RCdg/nISQG22k2BQyyWancm
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2256-0-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/2256-1-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1148 wrote to memory of 2256 1148 rundll32.exe 28 PID 1148 wrote to memory of 2256 1148 rundll32.exe 28 PID 1148 wrote to memory of 2256 1148 rundll32.exe 28 PID 1148 wrote to memory of 2256 1148 rundll32.exe 28 PID 1148 wrote to memory of 2256 1148 rundll32.exe 28 PID 1148 wrote to memory of 2256 1148 rundll32.exe 28 PID 1148 wrote to memory of 2256 1148 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17d8189872220453bde640d02f04eec0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17d8189872220453bde640d02f04eec0_JaffaCakes118.dll,#12⤵PID:2256
-