Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 17:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3a165c830dca686c36c572be16bbd5ba_JaffaCakes118.dll
Resource
win7-20240705-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
3a165c830dca686c36c572be16bbd5ba_JaffaCakes118.dll
Resource
win10v2004-20240709-en
4 signatures
150 seconds
General
-
Target
3a165c830dca686c36c572be16bbd5ba_JaffaCakes118.dll
-
Size
264KB
-
MD5
3a165c830dca686c36c572be16bbd5ba
-
SHA1
2b7b8bb2e5f0b0431717961b0312052d39eed753
-
SHA256
1ad1035399e0ee09a91b610460052f136b8abd098724f1812ce5203dcd4679bb
-
SHA512
515a805edb1470e0c84fbc603ac81fd6bc56746fc7b7e6a224906cb28e8f5d7f74ed28c8fe39867c40cda24593c0309076b9de978c08d8e78687ace1d7dd3497
-
SSDEEP
6144:4CmwT80qFG7C/al9SEUkLDqw3sz3n6HR0bz4queIW:cYc1NUt8z3n624quRW
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Hbuxop = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\3a165c830dca686c36c572be16bbd5ba_JaffaCakes118.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1088 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1088 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1316 wrote to memory of 1088 1316 rundll32.exe 30 PID 1316 wrote to memory of 1088 1316 rundll32.exe 30 PID 1316 wrote to memory of 1088 1316 rundll32.exe 30 PID 1316 wrote to memory of 1088 1316 rundll32.exe 30 PID 1316 wrote to memory of 1088 1316 rundll32.exe 30 PID 1316 wrote to memory of 1088 1316 rundll32.exe 30 PID 1316 wrote to memory of 1088 1316 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a165c830dca686c36c572be16bbd5ba_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a165c830dca686c36c572be16bbd5ba_JaffaCakes118.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1088
-