Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 12:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
34d24a4d19a53f184b24dfb9e9d74479_JaffaCakes118.dll
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
34d24a4d19a53f184b24dfb9e9d74479_JaffaCakes118.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
34d24a4d19a53f184b24dfb9e9d74479_JaffaCakes118.dll
-
Size
54KB
-
MD5
34d24a4d19a53f184b24dfb9e9d74479
-
SHA1
9dd1d3759809439e2975e56e8d76ab4edc1bad69
-
SHA256
994d86c5a3b19394b6c8ca10d1e05e0ddbca7af8b4fad95e0c9b28b7340c0556
-
SHA512
aa67e15295e23fa427e8db3879281b2d904a97d009e36e8b80ad975bf8733aaa070ab2a717186974ebf5e098f71c7c504f89b566a2e30256e754b37cdca3c458
-
SSDEEP
768:8acskotYmzzYRe8C3e82x0KYDVkSUAyFK1PB9h6oLj/lq9u0wM9gV2TjGzGa+KC+:co2mzzYMxfKuuMyWZl+w0WzGuCCL
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\zebizino.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\guvajoye rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1644 rundll32.exe 1644 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3492 wrote to memory of 1644 3492 rundll32.exe 81 PID 3492 wrote to memory of 1644 3492 rundll32.exe 81 PID 3492 wrote to memory of 1644 3492 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34d24a4d19a53f184b24dfb9e9d74479_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34d24a4d19a53f184b24dfb9e9d74479_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1644
-