Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 05:18
Behavioral task
behavioral1
Sample
213182560f7162f946dba2e01233bd46_JaffaCakes118.dll
Resource
win7-20240611-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
213182560f7162f946dba2e01233bd46_JaffaCakes118.dll
Resource
win10v2004-20240611-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
213182560f7162f946dba2e01233bd46_JaffaCakes118.dll
-
Size
66KB
-
MD5
213182560f7162f946dba2e01233bd46
-
SHA1
14a20161ca884c6cb4d2ce6e44b13b7d9fbdc3c3
-
SHA256
759eb3215e7b4ac9e32e45f20152ccf589292c3b25b2e89ddafd45c4b70896c8
-
SHA512
290219e2557dc358e54fd6bb548791caf8a3ee44064a4db4a1fbe382595d0fe111aa5d959b8c82379236834902f06352b80324d8f4a559cda90610d685565ae1
-
SSDEEP
1536:Im0iRnrgCN+TtANvtPc0yHh+2UUd+MZQ6dM8p1VNxam5q5f:IARVgtqPc4UJZdjpnHam5kf
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4672-0-0x0000000010000000-0x0000000010032000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5412 wrote to memory of 4672 5412 rundll32.exe 82 PID 5412 wrote to memory of 4672 5412 rundll32.exe 82 PID 5412 wrote to memory of 4672 5412 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\213182560f7162f946dba2e01233bd46_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\213182560f7162f946dba2e01233bd46_JaffaCakes118.dll,#12⤵PID:4672
-