Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 15:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3565326225bfa74818f6752b6dc87edc_JaffaCakes118.dll
Resource
win7-20240705-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3565326225bfa74818f6752b6dc87edc_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
3565326225bfa74818f6752b6dc87edc_JaffaCakes118.dll
-
Size
254KB
-
MD5
3565326225bfa74818f6752b6dc87edc
-
SHA1
c8ad483fb0c20e158d89a8b4bfd0d049138df8ed
-
SHA256
5791c6ab288ffddb8e23514c383a51849e1293dc6f11f58a7a23757a9b00f6a0
-
SHA512
d2965ddae104778745e92ae9c1669fa44fe5437184a5fbda5c1b86562407979a57c0540b64032844a31d127aa7b82786a5d347b6f48d548c50e41465522da87c
-
SSDEEP
6144:Vc3W3ZZ+PuJUaDcUTD1do9lGJ8/FUQfhOGv7htx/oCzvuZ9:Vc3WLyuGaDcA1dEG6/FUEhXvlnQCi
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1464 rundll32.exe 1464 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4616 wrote to memory of 1464 4616 rundll32.exe 82 PID 4616 wrote to memory of 1464 4616 rundll32.exe 82 PID 4616 wrote to memory of 1464 4616 rundll32.exe 82 PID 1464 wrote to memory of 3444 1464 rundll32.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3444
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3565326225bfa74818f6752b6dc87edc_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3565326225bfa74818f6752b6dc87edc_JaffaCakes118.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1464
-
-