Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 21:16
Behavioral task
behavioral1
Sample
64d5a803de29ae89f36d24c01045032c_JaffaCakes118.dll
Resource
win7-20240704-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
64d5a803de29ae89f36d24c01045032c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
64d5a803de29ae89f36d24c01045032c_JaffaCakes118.dll
-
Size
72KB
-
MD5
64d5a803de29ae89f36d24c01045032c
-
SHA1
8b439e4b7699c53cb837d511c5754ecee09f12a0
-
SHA256
cb91f9e61db3e0d4fff0bc8d8e13b5db299d66c45e4211b765ecdac817d43b71
-
SHA512
9b001350407b7cf07fc3bdfb8944f2a9ee20562246400420881668571eef934276582745234b1278701f6393b9c6da73eea6fb688202e98c67bf812cc8bd738b
-
SSDEEP
1536:agF0eiyUcbrSiYm8ZD06YOUh7EDBAvANPc2FgTee7eo:t2yFfNYm8ifOUh7gBsAN5FgSI
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4808-0-0x0000000010000000-0x0000000010011000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 540 wrote to memory of 4808 540 rundll32.exe 84 PID 540 wrote to memory of 4808 540 rundll32.exe 84 PID 540 wrote to memory of 4808 540 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64d5a803de29ae89f36d24c01045032c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64d5a803de29ae89f36d24c01045032c_JaffaCakes118.dll,#12⤵PID:4808
-