Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 19:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
64676617cd8cc5a1cb1632d49d946c6c_JaffaCakes118.dll
Resource
win7-20240708-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
64676617cd8cc5a1cb1632d49d946c6c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
64676617cd8cc5a1cb1632d49d946c6c_JaffaCakes118.dll
-
Size
13KB
-
MD5
64676617cd8cc5a1cb1632d49d946c6c
-
SHA1
a72b958ac9e1edaea3b8fd5a9d3a34e3f49b3190
-
SHA256
35549164c1192b6749fdcec05945b2dfdaf5557e7fd8c2cd1da02f74072d64b4
-
SHA512
77aa41aa6585e0ab5f8d3ffcac17baad19368cbc44687f743b7dc9e8bbcdc11061eaee7886b2b17a2d1aa50fa13a8eeef437ddbb6e5aa4d7bee2087decd99566
-
SSDEEP
24:eH1GSdFNMy98Fga5sgNfsrsCqtK0TKW4tsJAR/NDMf+n/rx6LArZ0oyC2hBuBe74:ydPEgaLstqY1tn/dLEfuBeuR5c4z
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1500 2052 rundll32.exe 30 PID 2052 wrote to memory of 1500 2052 rundll32.exe 30 PID 2052 wrote to memory of 1500 2052 rundll32.exe 30 PID 2052 wrote to memory of 1500 2052 rundll32.exe 30 PID 2052 wrote to memory of 1500 2052 rundll32.exe 30 PID 2052 wrote to memory of 1500 2052 rundll32.exe 30 PID 2052 wrote to memory of 1500 2052 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64676617cd8cc5a1cb1632d49d946c6c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64676617cd8cc5a1cb1632d49d946c6c_JaffaCakes118.dll,#12⤵PID:1500
-