Analysis
-
max time kernel
140s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 22:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
21f28212aa1d77ea0cd886d7be387bad_JaffaCakes118.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
21f28212aa1d77ea0cd886d7be387bad_JaffaCakes118.dll
Resource
win10v2004-20240419-en
1 signatures
150 seconds
General
-
Target
21f28212aa1d77ea0cd886d7be387bad_JaffaCakes118.dll
-
Size
10.2MB
-
MD5
21f28212aa1d77ea0cd886d7be387bad
-
SHA1
1a73ab01ffeb2b597df94c93bc895021151b8197
-
SHA256
6264ff4b5cf185360a06fbc9f1297da8a228afe2534f5dbc48ecac7163067d95
-
SHA512
0544784d475194ee2bf9eceb4aee190debf35d07c8dba1955a6e912d207366e6a1ae463a08ba7e79d973e88d44950b973b4ad80cced69d1c1ee4ceda4b466138
-
SSDEEP
98304:TC+l8NWii+2eHVijFNjv34NAjriHNRrsIPYOx6qbHkciAUz5eylK7/iAXflijzJk:TCyDe1ITjwNAfitR4IxnU5ey4Xf6
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1496 wrote to memory of 372 1496 rundll32.exe 84 PID 1496 wrote to memory of 372 1496 rundll32.exe 84 PID 1496 wrote to memory of 372 1496 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21f28212aa1d77ea0cd886d7be387bad_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21f28212aa1d77ea0cd886d7be387bad_JaffaCakes118.dll,#12⤵PID:372
-