Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 16:12
Behavioral task
behavioral1
Sample
faac840cdbed6a7d6dcb9a4bde788f60_JaffaCakes118.dll
Resource
win7-20240215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
faac840cdbed6a7d6dcb9a4bde788f60_JaffaCakes118.dll
Resource
win10v2004-20240412-en
1 signatures
150 seconds
General
-
Target
faac840cdbed6a7d6dcb9a4bde788f60_JaffaCakes118.dll
-
Size
34KB
-
MD5
faac840cdbed6a7d6dcb9a4bde788f60
-
SHA1
85f906a7b9c1bfabd3df73a30afa905d3efbe6d6
-
SHA256
3805829f70d5c02456a9e99c72c0a04c0ac30189f2be2a22ba70352a6e53d85e
-
SHA512
608f81d65f65856edb0908271b0e73499d1ee7356f923fbfe71926934e993e9ffd3807104f0ea26f9b2323e7f1065309c850e219bfa7c9ac1f6f7cc0ab075ebc
-
SSDEEP
768:BFNrvyFIJq5k4FC2HQUZwwrkT2q03aNVB/UulqlqK+SIyuFy/6/QCfrqsgMo:Bvvpmk1UZww02VsVB/UMqlq6uIyVzo
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 404 wrote to memory of 5060 404 rundll32.exe 84 PID 404 wrote to memory of 5060 404 rundll32.exe 84 PID 404 wrote to memory of 5060 404 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\faac840cdbed6a7d6dcb9a4bde788f60_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\faac840cdbed6a7d6dcb9a4bde788f60_JaffaCakes118.dll,#12⤵PID:5060
-