Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 14:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e7a937d50cc88f3da3f866f433ac3d3a_JaffaCakes118.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
e7a937d50cc88f3da3f866f433ac3d3a_JaffaCakes118.dll
Resource
win10v2004-20240226-en
1 signatures
150 seconds
General
-
Target
e7a937d50cc88f3da3f866f433ac3d3a_JaffaCakes118.dll
-
Size
14KB
-
MD5
e7a937d50cc88f3da3f866f433ac3d3a
-
SHA1
d82969b6345063713627f05f471a41821b548fe4
-
SHA256
d47e277e61af93c8daba2f374cf26b070d0f3808a3fae9d70fbca1f92cba9543
-
SHA512
0f2671efce262cc786feb9d6e61b849181d4a1167fe3e818b65bf10780f58becc832d52e5b91da1d93651b1a08d38cae38da414e9abd2f616d94f4eac6db484c
-
SSDEEP
192:TlzOsPBtZCIHE4sQ5cWuOlSiUIWdZFybQdg3X:TlqsPBtZTHbsQ5lvlnWdBi3X
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4460 wrote to memory of 3116 4460 rundll32.exe 85 PID 4460 wrote to memory of 3116 4460 rundll32.exe 85 PID 4460 wrote to memory of 3116 4460 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e7a937d50cc88f3da3f866f433ac3d3a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e7a937d50cc88f3da3f866f433ac3d3a_JaffaCakes118.dll,#12⤵PID:3116
-