Analysis
-
max time kernel
92s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 15:39
Behavioral task
behavioral1
Sample
5c918883d448579a33ef17b0cf94ce99_JaffaCakes118.dll
Resource
win7-20240705-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
5c918883d448579a33ef17b0cf94ce99_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
5c918883d448579a33ef17b0cf94ce99_JaffaCakes118.dll
-
Size
161KB
-
MD5
5c918883d448579a33ef17b0cf94ce99
-
SHA1
be754028de9318664770815903683205891c6dfa
-
SHA256
72e5e72bb4631e93e914e6276ce1e0914e4326597c4a39c31e7315d7965f2fc2
-
SHA512
487c8058ff33374baf76c5b5030b528225e291e4309578245780831449e0b91485c1ecf51c4846629b9a1c7db75ed114932d2fa5a372e1b75e170c40faa5316b
-
SSDEEP
3072:P7Okmvfm396HM0XU+aDembri59tuvdZhhL/H0XpmT9a5ZyYaCeNbX:jQXWn+aCP0vdZhhL0MTEhafBX
Score
1/10
Malware Config
Signatures
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5036 wrote to memory of 3156 5036 rundll32.exe 84 PID 5036 wrote to memory of 3156 5036 rundll32.exe 84 PID 5036 wrote to memory of 3156 5036 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c918883d448579a33ef17b0cf94ce99_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c918883d448579a33ef17b0cf94ce99_JaffaCakes118.dll,#12⤵
- Modifies registry class
PID:3156
-