Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 06:09
Behavioral task
behavioral1
Sample
27810e5d971ed51c652ecb0bb4189045_JaffaCakes118.dll
Resource
win7-20240705-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
27810e5d971ed51c652ecb0bb4189045_JaffaCakes118.dll
Resource
win10v2004-20240704-en
2 signatures
150 seconds
General
-
Target
27810e5d971ed51c652ecb0bb4189045_JaffaCakes118.dll
-
Size
54KB
-
MD5
27810e5d971ed51c652ecb0bb4189045
-
SHA1
13831d7bf2d30fb76e9bc33fd04ebd2fc665370c
-
SHA256
3174690af239c37dc1e07571def0f3c2c633b8f7609183827abb823be10d8d2e
-
SHA512
273475c894e9c315801fc242238c752fb7bb5e77e47348821f3981c41f86b8796c83bed1a59798ae7bb8b015d198a240916165c161af7ee8e3977d8b565264f7
-
SSDEEP
768:56IRmOOu8mUF5Is8l4d1xjmcW5cBbJDkAZkqYLy/ClD0Iiyp+Fy6WRdD18vo:5jRmOpW1xjm86z7D0rFyhZEo
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4600-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 544 wrote to memory of 4600 544 rundll32.exe 82 PID 544 wrote to memory of 4600 544 rundll32.exe 82 PID 544 wrote to memory of 4600 544 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\27810e5d971ed51c652ecb0bb4189045_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\27810e5d971ed51c652ecb0bb4189045_JaffaCakes118.dll,#12⤵PID:4600
-