Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 11:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e276573a0bd2a98b5e35ae03ad3ebd9a_JaffaCakes118.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
e276573a0bd2a98b5e35ae03ad3ebd9a_JaffaCakes118.dll
Resource
win10v2004-20240226-en
1 signatures
150 seconds
General
-
Target
e276573a0bd2a98b5e35ae03ad3ebd9a_JaffaCakes118.dll
-
Size
235KB
-
MD5
e276573a0bd2a98b5e35ae03ad3ebd9a
-
SHA1
cccde684dbb865845a8efb4439c42f95c5b545a4
-
SHA256
4f61fceaac2e437ad42fff9d715a3c5e6c9e8bebd8691ea486d2f316373a00c2
-
SHA512
71a2d1f284749f146c429b30d517d1209a2ff5f0a81154d23bace56fb76ff9f837608caa975e378ff5d309badb833506c876c14d56b30e2b9bcc97d160caff1c
-
SSDEEP
6144:h/xySJfNn8Ys1ir2otR07MiTTNRp4k0cW6au3:h1Fn8Yscr22R07MiT9D0cW6/3
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3180 wrote to memory of 2992 3180 rundll32.exe 85 PID 3180 wrote to memory of 2992 3180 rundll32.exe 85 PID 3180 wrote to memory of 2992 3180 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e276573a0bd2a98b5e35ae03ad3ebd9a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e276573a0bd2a98b5e35ae03ad3ebd9a_JaffaCakes118.dll,#12⤵PID:2992
-