Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 00:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0189dc917739a052ab2ba8acf980df62_JaffaCakes118.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
0189dc917739a052ab2ba8acf980df62_JaffaCakes118.dll
Resource
win10v2004-20240508-en
1 signatures
150 seconds
General
-
Target
0189dc917739a052ab2ba8acf980df62_JaffaCakes118.dll
-
Size
22KB
-
MD5
0189dc917739a052ab2ba8acf980df62
-
SHA1
1ab3beb51ef7e97e1cb150d961d80f9447ed1987
-
SHA256
9b23ed90aa05ffd89707361b5f17686ea191e8bb3d3d54317d3c258cf106dbfd
-
SHA512
7500c39c77e13fe08e56bcc9f7ac524f259528f5cbac0cc757dce892d1ebe8a036bc33b8cf2572e2feea269b7bc31816467a5c2371f6933a6f1c06f908011fa6
-
SSDEEP
384:neJu45MQQDwIAFsu5QXyqzarDVE9HtX/kuSZ2nD8+Q8yjKelqQSiKY:g79lsu5PqOJE9HtXpeUyjKW
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4832 wrote to memory of 5104 4832 rundll32.exe 82 PID 4832 wrote to memory of 5104 4832 rundll32.exe 82 PID 4832 wrote to memory of 5104 4832 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0189dc917739a052ab2ba8acf980df62_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0189dc917739a052ab2ba8acf980df62_JaffaCakes118.dll,#12⤵PID:5104
-