Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 16:53
Behavioral task
behavioral1
Sample
5cd220cd09b25906bbe022be0daf2c87_JaffaCakes118.dll
Resource
win7-20240705-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5cd220cd09b25906bbe022be0daf2c87_JaffaCakes118.dll
Resource
win10v2004-20240709-en
3 signatures
150 seconds
General
-
Target
5cd220cd09b25906bbe022be0daf2c87_JaffaCakes118.dll
-
Size
45KB
-
MD5
5cd220cd09b25906bbe022be0daf2c87
-
SHA1
0fc1d3c5169b7c45930f25093e3b22825e2f3990
-
SHA256
1017809bbdd13c0415f013426492f8561b3b989ed0976916c3a3633e0bffaaa7
-
SHA512
4c278b0aeb56fc289cc9b43cdbc73e57e62c7816677ad38d630c0fb90075906ca3aff0beb00e55bf11719ce535c0a5e18bf951cdcad50d2530df153994b1dca2
-
SSDEEP
768:TlkKfTmk4jAQQfL76R96VmJdguP+49gLZCTsd6:TlkKfTmkPffL76R9g4Cu19+wTs
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2556-0-0x0000000010000000-0x000000001000C000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2556 rundll32.exe 2556 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2556 1860 rundll32.exe 84 PID 1860 wrote to memory of 2556 1860 rundll32.exe 84 PID 1860 wrote to memory of 2556 1860 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5cd220cd09b25906bbe022be0daf2c87_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5cd220cd09b25906bbe022be0daf2c87_JaffaCakes118.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:2556
-