Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 11:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
eaf4d433d980c4727c648962004c7f07_JaffaCakes118.dll
Resource
win7-20240215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
eaf4d433d980c4727c648962004c7f07_JaffaCakes118.dll
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
eaf4d433d980c4727c648962004c7f07_JaffaCakes118.dll
-
Size
761KB
-
MD5
eaf4d433d980c4727c648962004c7f07
-
SHA1
ab74db5c63fc292f9703df9faed409c9846125ec
-
SHA256
8639139df7440451ff4d6a36d894887ad418f9d89dd9df55813c95615866da1a
-
SHA512
f3c67dbe654f1d3636c77154c1e8d2681f4adb7aa8d9eb8ef4feeb67cda4583892375cb68986415326a0c6037947588daba77df32bfbbbf504259076fce598d0
-
SSDEEP
384:uCnv8N+pszDE/EfHozZ26wA6jiJf8JKWQu:uCvNlLzkvjAfIKWQu
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 228 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4944 wrote to memory of 228 4944 rundll32.exe 86 PID 4944 wrote to memory of 228 4944 rundll32.exe 86 PID 4944 wrote to memory of 228 4944 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eaf4d433d980c4727c648962004c7f07_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eaf4d433d980c4727c648962004c7f07_JaffaCakes118.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:228
-