Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 13:21
Static task
static1
Behavioral task
behavioral1
Sample
eb29ad66ba7666fcd3668b6b1e41fd5a_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
eb29ad66ba7666fcd3668b6b1e41fd5a_JaffaCakes118.dll
Resource
win10v2004-20240319-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
eb29ad66ba7666fcd3668b6b1e41fd5a_JaffaCakes118.dll
-
Size
190KB
-
MD5
eb29ad66ba7666fcd3668b6b1e41fd5a
-
SHA1
c1ac2c5d0bc6e405ac2f301b3fbd8e421fb22f6c
-
SHA256
42324628f7a78e897a1c06a385ab7059a655537a10f3938e3f7171ca5e2cddb6
-
SHA512
e301618e359db0c9492f1c3364155f85d93f7d59b883996c9c27d3fbd79e58cc005651913604e0b99741abe7947b2a8fb6662909c53c4e77da1ec5ab5750d3c1
-
SSDEEP
3072:o1omXMb9iqZOWvBrvMp8q4VeTuaKZ+IuIZUHTiMwin5SCsvYv:o2Jb9iRGruH4VeqHcHTn8Cjv
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2504 1284 rundll32.exe 28 PID 1284 wrote to memory of 2504 1284 rundll32.exe 28 PID 1284 wrote to memory of 2504 1284 rundll32.exe 28 PID 1284 wrote to memory of 2504 1284 rundll32.exe 28 PID 1284 wrote to memory of 2504 1284 rundll32.exe 28 PID 1284 wrote to memory of 2504 1284 rundll32.exe 28 PID 1284 wrote to memory of 2504 1284 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb29ad66ba7666fcd3668b6b1e41fd5a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb29ad66ba7666fcd3668b6b1e41fd5a_JaffaCakes118.dll,#12⤵PID:2504
-