Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 12:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1b3d1ccd660ebabfc1555527d4ebe9ac_JaffaCakes118.dll
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
1b3d1ccd660ebabfc1555527d4ebe9ac_JaffaCakes118.dll
Resource
win10v2004-20240611-en
4 signatures
150 seconds
General
-
Target
1b3d1ccd660ebabfc1555527d4ebe9ac_JaffaCakes118.dll
-
Size
252KB
-
MD5
1b3d1ccd660ebabfc1555527d4ebe9ac
-
SHA1
116278a05dc3b38e5113ff1c2749e32f17f37bc5
-
SHA256
d17f4efdeae2156c7a7a08cc81361e0096b625995ce1143778f18a8979d77b82
-
SHA512
5446980c47cf46d89f55b5c93c0c189b03ef02baf9f31a9c0f8b4fdbe88ca4333e533565d7095b5ad337551b92a72c6c412abeaa38c5863816ccdb2ec32d0dd4
-
SSDEEP
6144:+khE6PzoYPkg2SQXckAh5uBiaD1BdxRfi:ZPz7NVvhYBiaDjd7
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Xyirajon = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\1b3d1ccd660ebabfc1555527d4ebe9ac_JaffaCakes118.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1840 rundll32.exe 1840 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1840 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3088 wrote to memory of 1840 3088 rundll32.exe 82 PID 3088 wrote to memory of 1840 3088 rundll32.exe 82 PID 3088 wrote to memory of 1840 3088 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b3d1ccd660ebabfc1555527d4ebe9ac_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b3d1ccd660ebabfc1555527d4ebe9ac_JaffaCakes118.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1840
-