Analysis
-
max time kernel
14s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 00:44
Behavioral task
behavioral1
Sample
657900719ca688696d919f2136357fbd_JaffaCakes118.dll
Resource
win7-20240704-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
657900719ca688696d919f2136357fbd_JaffaCakes118.dll
Resource
win10v2004-20240709-en
3 signatures
150 seconds
General
-
Target
657900719ca688696d919f2136357fbd_JaffaCakes118.dll
-
Size
86KB
-
MD5
657900719ca688696d919f2136357fbd
-
SHA1
3e0bf713667bb7af4cf2401b08d35ae284af7a87
-
SHA256
69b20a717bb476a2f8b7b3f9c6f010e232987cb063db415823877552fccf855e
-
SHA512
2e2768bee8f049b6cd41d5d4e0bd8e6ee1536b48b4699ddabea9c85c28b4a9a2712e4d0dcc5932526c83cb55b95b7935a98fdf3c86a16e9b9782536e35b7348c
-
SSDEEP
1536:mkJvFEhpEWiQW8xs5rvVbLodIgM+IhC2cb2oA0I:mkJNEhOW1W3rvVbQwPhHaAt
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2908-2-0x0000000010000000-0x000000001000D000-memory.dmp upx behavioral1/memory/2908-1-0x0000000010000000-0x000000001000D000-memory.dmp upx behavioral1/memory/2908-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2908 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2908 2488 rundll32.exe 29 PID 2488 wrote to memory of 2908 2488 rundll32.exe 29 PID 2488 wrote to memory of 2908 2488 rundll32.exe 29 PID 2488 wrote to memory of 2908 2488 rundll32.exe 29 PID 2488 wrote to memory of 2908 2488 rundll32.exe 29 PID 2488 wrote to memory of 2908 2488 rundll32.exe 29 PID 2488 wrote to memory of 2908 2488 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\657900719ca688696d919f2136357fbd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\657900719ca688696d919f2136357fbd_JaffaCakes118.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:2908
-