Analysis
-
max time kernel
134s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 12:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
418b342b48e4c63e1c2b2e5ba7a7054a_JaffaCakes118.dll
Resource
win7-20240508-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
418b342b48e4c63e1c2b2e5ba7a7054a_JaffaCakes118.dll
Resource
win10v2004-20240426-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
418b342b48e4c63e1c2b2e5ba7a7054a_JaffaCakes118.dll
-
Size
35KB
-
MD5
418b342b48e4c63e1c2b2e5ba7a7054a
-
SHA1
750f784ce5acf2d953caa2de449a52ffa67b5cb2
-
SHA256
fae86ff0e3ccfd18b42cb2f1007e4e85377144efc2bd257068b0a2e50d4e692d
-
SHA512
5ed01463298294a3be169b96193e0472598c02f8c9bee2f5aafa83545da09236a8cdb1533808a58a416ca2d77b22a6ea2ed6a7024343514731c4aeb22beca3a6
-
SSDEEP
768:sN2kO1VdW+prtnZbbEsEdYHpx8m7DmCCqq:S2k4XW+ttnZbEddY78RFqq
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4304 wrote to memory of 1584 4304 rundll32.exe 82 PID 4304 wrote to memory of 1584 4304 rundll32.exe 82 PID 4304 wrote to memory of 1584 4304 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\418b342b48e4c63e1c2b2e5ba7a7054a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\418b342b48e4c63e1c2b2e5ba7a7054a_JaffaCakes118.dll,#12⤵PID:1584
-