Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 08:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
197d88e8c06f2e3d83db0f68dec97b1b_JaffaCakes118.dll
Resource
win7-20240220-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
197d88e8c06f2e3d83db0f68dec97b1b_JaffaCakes118.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
197d88e8c06f2e3d83db0f68dec97b1b_JaffaCakes118.dll
-
Size
276KB
-
MD5
197d88e8c06f2e3d83db0f68dec97b1b
-
SHA1
c64b64e4623b30a543a6c550d964c2dc636387cf
-
SHA256
4450b5db7ebec82ec2d2ca6ee4f55b24ce1945e39ce36ef40e5f16782039c950
-
SHA512
6bb7ae059361c0dfb3f82ccb673b9143183f458f910a5f636c05c3a2f9148e12832032e32a92d5150679c962ff695cc67b03f9fc3a69d6c3ef6e327914d6277b
-
SSDEEP
6144:Vuv4tnHd8KL7D0bajTqxrP5c8d4vgziLfSB/vdGmqsvBy:VumHSK3D0bXrm87iLqVsVj
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Tjetowukatiyuw = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\197d88e8c06f2e3d83db0f68dec97b1b_JaffaCakes118.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3068 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3068 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2924 wrote to memory of 3068 2924 rundll32.exe 28 PID 2924 wrote to memory of 3068 2924 rundll32.exe 28 PID 2924 wrote to memory of 3068 2924 rundll32.exe 28 PID 2924 wrote to memory of 3068 2924 rundll32.exe 28 PID 2924 wrote to memory of 3068 2924 rundll32.exe 28 PID 2924 wrote to memory of 3068 2924 rundll32.exe 28 PID 2924 wrote to memory of 3068 2924 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\197d88e8c06f2e3d83db0f68dec97b1b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\197d88e8c06f2e3d83db0f68dec97b1b_JaffaCakes118.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3068
-