Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 08:19
Behavioral task
behavioral1
Sample
16c9d69251bb1084269d787478d17be0_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
16c9d69251bb1084269d787478d17be0_JaffaCakes118.dll
Resource
win10v2004-20240426-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
16c9d69251bb1084269d787478d17be0_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
16c9d69251bb1084269d787478d17be0
-
SHA1
34ccfe984fb47e0b9ff1574b8632992a5ddc1659
-
SHA256
065d45fe809eb111fcdeb7ec6ee7a23141ff58e27d2443286d0465dd84467d5b
-
SHA512
b16f039e2c0caee55e27f7e03a4e9488e35d47e72545b35739a5e954b6a5249fda7ff21a8a423a2eb8d795c9ceb18d466fbd5dcfc76b249dfe603184fb30b363
-
SSDEEP
24576:C0ucFLJjPM0C1/KDwEo5TCG5ST33w1tJnIHVNlUzNVSXiKu7eTl8JRWyXIK+b0:UCjPM0CMkEm5Sj3w1tJI1DkVEiKu7TRp
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4020 wrote to memory of 4148 4020 rundll32.exe rundll32.exe PID 4020 wrote to memory of 4148 4020 rundll32.exe rundll32.exe PID 4020 wrote to memory of 4148 4020 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16c9d69251bb1084269d787478d17be0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16c9d69251bb1084269d787478d17be0_JaffaCakes118.dll,#12⤵PID:4148