Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 02:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
023c2428f2b702a46e3605240c157723_JaffaCakes118.dll
Resource
win7-20240508-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
023c2428f2b702a46e3605240c157723_JaffaCakes118.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
023c2428f2b702a46e3605240c157723_JaffaCakes118.dll
-
Size
961KB
-
MD5
023c2428f2b702a46e3605240c157723
-
SHA1
f44cfb43add4eb70e89027fa7b582ebd516b40d2
-
SHA256
874a9b22c0632835c5373cbdc321f80757f0d43a9439e1829cb6f6fc66be681f
-
SHA512
00d189766d1b66b7f89e39e123c43f62c40d76a17968ad3315d8fcfbea3d99930b1da6471da837e8df75c75c333f7b500e0fbdba327cc35b44620f13de3c34bf
-
SSDEEP
24576:o2blywTXHWUBaSycop/C+ZrenQ+yn7U8R3FDmXx:5ywcLen7QDq
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2248 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2248 2824 rundll32.exe 83 PID 2824 wrote to memory of 2248 2824 rundll32.exe 83 PID 2824 wrote to memory of 2248 2824 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\023c2428f2b702a46e3605240c157723_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\023c2428f2b702a46e3605240c157723_JaffaCakes118.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:2248
-