Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 01:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fe148e80a17c1f1775860a44ec68d596_JaffaCakes118.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
fe148e80a17c1f1775860a44ec68d596_JaffaCakes118.dll
Resource
win10v2004-20240412-en
1 signatures
150 seconds
General
-
Target
fe148e80a17c1f1775860a44ec68d596_JaffaCakes118.dll
-
Size
3KB
-
MD5
fe148e80a17c1f1775860a44ec68d596
-
SHA1
31d0987c3ae527876c5c1d21f73fb043e0e4d82c
-
SHA256
c095b497e5fdd7b8fcbd20420535789fb9db4285a32d33368d012edf1ed029db
-
SHA512
5348955328225f4195b8de0dbb9a623202457018b6c9b92f16220bfdb3b85f01e6fffc802ad03e9b8369368bfe9959e3a9b29bccc825cf15fdcc4dd4adb6e809
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1044 wrote to memory of 3168 1044 rundll32.exe 84 PID 1044 wrote to memory of 3168 1044 rundll32.exe 84 PID 1044 wrote to memory of 3168 1044 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe148e80a17c1f1775860a44ec68d596_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe148e80a17c1f1775860a44ec68d596_JaffaCakes118.dll,#12⤵PID:3168
-