Analysis
-
max time kernel
93s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 03:49
Behavioral task
behavioral1
Sample
2ee67aedc727733a99e81419a60c503a_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2ee67aedc727733a99e81419a60c503a_JaffaCakes118.dll
Resource
win10v2004-20240704-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2ee67aedc727733a99e81419a60c503a_JaffaCakes118.dll
-
Size
74KB
-
MD5
2ee67aedc727733a99e81419a60c503a
-
SHA1
0a5f309d4696811ac8df53df0672f7ad57950689
-
SHA256
2fd80e67ebab32ba8dc205e8c1217abdc6ff954d6549e92001f5bd11b89018a3
-
SHA512
82a32b55c57db6b15990c54a4cdfa08e9106578ab90116f2abbd345252c8b5ff8c33ade4e3c4512f4db8bea6aedd5c5b11e10206b1b673feb3f6dd8db15bd559
-
SSDEEP
1536:1zExMwCGQ2jjuM8E4YCbYONB184oT9spa9GhpSW1gYao6bSk:1I+wCGvXspX1CZsc9GCWU9Sk
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2660-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4780 wrote to memory of 2660 4780 rundll32.exe 82 PID 4780 wrote to memory of 2660 4780 rundll32.exe 82 PID 4780 wrote to memory of 2660 4780 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ee67aedc727733a99e81419a60c503a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ee67aedc727733a99e81419a60c503a_JaffaCakes118.dll,#12⤵PID:2660
-