Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 23:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
01142913289557176ac088c9af8735cd_JaffaCakes118.dll
Resource
win7-20240508-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
01142913289557176ac088c9af8735cd_JaffaCakes118.dll
Resource
win10v2004-20240611-en
2 signatures
150 seconds
General
-
Target
01142913289557176ac088c9af8735cd_JaffaCakes118.dll
-
Size
16KB
-
MD5
01142913289557176ac088c9af8735cd
-
SHA1
4caaae1c3ea688e13d324d3c90e4311a609572f7
-
SHA256
d1cb47cb948d8292f011a47ababa681aa025b4ec2e8d170723d59598c0583525
-
SHA512
e6dadce214ad318547219ae3fb2856dabd7d765fa110d9e0a4d7edbfeec8c3f8bca675d0932d16eb5c5ea0f466b8c8298597de095c344c638f6bb54a449c7d1e
-
SSDEEP
384:qg724mq8hjA5LAsNdv6B5KLk42dvT56+/50h+lF+AI:dN8BQH+5Ukfec3c
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4544 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4616 wrote to memory of 4544 4616 rundll32.exe 83 PID 4616 wrote to memory of 4544 4616 rundll32.exe 83 PID 4616 wrote to memory of 4544 4616 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\01142913289557176ac088c9af8735cd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\01142913289557176ac088c9af8735cd_JaffaCakes118.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4544
-