Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
8b73e4f0319f5fdb14c4d02d62bc2ba0_JaffaCakes118.dll
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
8b73e4f0319f5fdb14c4d02d62bc2ba0_JaffaCakes118.dll
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
8b73e4f0319f5fdb14c4d02d62bc2ba0_JaffaCakes118.dll
-
Size
31KB
-
MD5
8b73e4f0319f5fdb14c4d02d62bc2ba0
-
SHA1
867508bbf6eed07bb7c07eaa962e25ed732f8326
-
SHA256
11d212aef480820ba5423aa6d2932fc364d630e960f203e236fe860271186f23
-
SHA512
913312d398d613efd1ef48886d4e0c375bd41a05931ce0449331aa7841078711dfe96f7eb36804624b6427c0d92337b1d940942ded01d93280eb4d3f8f0b5b9f
-
SSDEEP
768:oyfKGXNgSN0i1zJn25w6gtMgNtBKC7kLs:Xig0i1x28NtBd7Ys
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4452 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3060 wrote to memory of 4452 3060 rundll32.exe 83 PID 3060 wrote to memory of 4452 3060 rundll32.exe 83 PID 3060 wrote to memory of 4452 3060 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b73e4f0319f5fdb14c4d02d62bc2ba0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b73e4f0319f5fdb14c4d02d62bc2ba0_JaffaCakes118.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4452
-