Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 18:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5d2c35d7915b627e5c4fb488c2747981_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5d2c35d7915b627e5c4fb488c2747981_JaffaCakes118.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
5d2c35d7915b627e5c4fb488c2747981_JaffaCakes118.dll
-
Size
116KB
-
MD5
5d2c35d7915b627e5c4fb488c2747981
-
SHA1
bc8dedb11231335f6ff07e9f4f151d5af208a2c1
-
SHA256
d88ba9f60d9bc686f7d6e2cb66d4af86f9cb75cbc83ec39e463dd078222c8935
-
SHA512
da3f648bac22ef9379909b58e0e2661480895a722beb839e4babe6fd632b1d4a7185bd9658f37935eb92984444d31d1a5aec689d6c19630f99c071c5484ba94b
-
SSDEEP
1536:CD+Uh4Lpbskv45D30oUCIFAi/tLCucTf45za3zzlZ7jeJHo7Jx8tLr:jUh4LhskvM3r7i/FDSXlZ7jeJHo7T8t
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1164 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 760 wrote to memory of 1164 760 rundll32.exe 29 PID 760 wrote to memory of 1164 760 rundll32.exe 29 PID 760 wrote to memory of 1164 760 rundll32.exe 29 PID 760 wrote to memory of 1164 760 rundll32.exe 29 PID 760 wrote to memory of 1164 760 rundll32.exe 29 PID 760 wrote to memory of 1164 760 rundll32.exe 29 PID 760 wrote to memory of 1164 760 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5d2c35d7915b627e5c4fb488c2747981_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5d2c35d7915b627e5c4fb488c2747981_JaffaCakes118.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1164
-