Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 23:07
Behavioral task
behavioral1
Sample
36c4e8dc682917d6faa2d0caaea86c6b_JaffaCakes118.dll
Resource
win7-20240705-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
36c4e8dc682917d6faa2d0caaea86c6b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
36c4e8dc682917d6faa2d0caaea86c6b_JaffaCakes118.dll
-
Size
15KB
-
MD5
36c4e8dc682917d6faa2d0caaea86c6b
-
SHA1
d851787eae824d27b7a9db054bd6930ce9262e55
-
SHA256
11da7645051186a0d8be9cecbc35d82d3cec8d1844a572cc46088d6b7344d382
-
SHA512
fa5c401589d87abff1ac10611a05f786c016da5dc03d5ea5d59ad639e5bd79380647e758a43214bb51b587a16597c0eb1b947658840bb82f304d87e240edcd4d
-
SSDEEP
384:DqAFfLueG+y4rqVN5nkF7aw9CXR5rgDZMAkfOiT:VFC1+y2+N5kV9CXiSuiT
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2408-0-0x0000000074B30000-0x0000000074B3E000-memory.dmp upx behavioral1/memory/2408-1-0x0000000074B30000-0x0000000074B3E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2408 2436 rundll32.exe 30 PID 2436 wrote to memory of 2408 2436 rundll32.exe 30 PID 2436 wrote to memory of 2408 2436 rundll32.exe 30 PID 2436 wrote to memory of 2408 2436 rundll32.exe 30 PID 2436 wrote to memory of 2408 2436 rundll32.exe 30 PID 2436 wrote to memory of 2408 2436 rundll32.exe 30 PID 2436 wrote to memory of 2408 2436 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\36c4e8dc682917d6faa2d0caaea86c6b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\36c4e8dc682917d6faa2d0caaea86c6b_JaffaCakes118.dll,#12⤵PID:2408
-