Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 02:56
Behavioral task
behavioral1
Sample
5ec4944922be5cab470d7bdf83a007a0_JaffaCakes118.dll
Resource
win7-20240704-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5ec4944922be5cab470d7bdf83a007a0_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
5ec4944922be5cab470d7bdf83a007a0_JaffaCakes118.dll
-
Size
86KB
-
MD5
5ec4944922be5cab470d7bdf83a007a0
-
SHA1
3eb746ffcd38912a741eee39989a2a0e90489221
-
SHA256
f23a61193d3a10fc8144416c53dd53bfed05dbdcc6faba633fa2278ca40a4f20
-
SHA512
bd7d8dcb623d71083d3ba49c28eee6e3ca505e4a83846508925f8743255e03d90870e86474057bb3ddd62576910e49490831cc09a1ab82b065b3c18964805c7f
-
SSDEEP
1536:ISKyVLql4k6MEymJ50eEBIa/FZYaCBShRJXIYEYrihl3J:ISKyVLqikzEy6B2vF+aG09IurizZ
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2504-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2504 2392 rundll32.exe 30 PID 2392 wrote to memory of 2504 2392 rundll32.exe 30 PID 2392 wrote to memory of 2504 2392 rundll32.exe 30 PID 2392 wrote to memory of 2504 2392 rundll32.exe 30 PID 2392 wrote to memory of 2504 2392 rundll32.exe 30 PID 2392 wrote to memory of 2504 2392 rundll32.exe 30 PID 2392 wrote to memory of 2504 2392 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ec4944922be5cab470d7bdf83a007a0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ec4944922be5cab470d7bdf83a007a0_JaffaCakes118.dll,#12⤵PID:2504
-