Analysis
-
max time kernel
101s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 10:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6733cad4b67077035333537126c7dbcf_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
6733cad4b67077035333537126c7dbcf_JaffaCakes118.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
6733cad4b67077035333537126c7dbcf_JaffaCakes118.dll
-
Size
37KB
-
MD5
6733cad4b67077035333537126c7dbcf
-
SHA1
1dfa16b1439233ab8b0da9824a9c018b426d4cc9
-
SHA256
1fd56cb53585c16c1b844f9189ef5035ce75ff0031d3df4bf2e13bfa41669964
-
SHA512
ceaa012531cde537b8cc270431bf68431e54fa9385f0bd2526a460e780f50476fc5ed58b3a27bd51a761b284e91e729c7781b8217c79f177b9783b6105edc9e5
-
SSDEEP
768:3c2ABjSfMh7DTDYI1PbjjswnBfmxsyljPzDDvbw:3c2cBvPDjnBfmWyl3
Score
1/10
Malware Config
Signatures
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1040 wrote to memory of 4848 1040 rundll32.exe 84 PID 1040 wrote to memory of 4848 1040 rundll32.exe 84 PID 1040 wrote to memory of 4848 1040 rundll32.exe 84 PID 4848 wrote to memory of 4612 4848 rundll32.exe 85 PID 4848 wrote to memory of 4612 4848 rundll32.exe 85 PID 4848 wrote to memory of 4612 4848 rundll32.exe 85 PID 4612 wrote to memory of 2200 4612 net.exe 87 PID 4612 wrote to memory of 2200 4612 net.exe 87 PID 4612 wrote to memory of 2200 4612 net.exe 87 PID 4848 wrote to memory of 4604 4848 rundll32.exe 89 PID 4848 wrote to memory of 4604 4848 rundll32.exe 89 PID 4848 wrote to memory of 4604 4848 rundll32.exe 89 PID 4604 wrote to memory of 784 4604 net.exe 91 PID 4604 wrote to memory of 784 4604 net.exe 91 PID 4604 wrote to memory of 784 4604 net.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6733cad4b67077035333537126c7dbcf_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6733cad4b67077035333537126c7dbcf_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\net.exenet stop winss3⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop winss4⤵PID:2200
-
-
-
C:\Windows\SysWOW64\net.exenet stop OcHealthMon3⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop OcHealthMon4⤵PID:784
-
-
-