Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 18:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0a1e08ab193b9e219e645959baae15cc_JaffaCakes118.dll
Resource
win7-20240611-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
0a1e08ab193b9e219e645959baae15cc_JaffaCakes118.dll
Resource
win10v2004-20240611-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
0a1e08ab193b9e219e645959baae15cc_JaffaCakes118.dll
-
Size
80KB
-
MD5
0a1e08ab193b9e219e645959baae15cc
-
SHA1
b55722042171151e7cc3680b086d5d97c5858ccb
-
SHA256
3e9a702bb6f63bb6f53bde40c61b27e645b32fcfc22ba6b2bd86cb9892d85c65
-
SHA512
bf375c922ef9ca9ddf667a3dbce35373db6d345901ad9ade93cfcb5afb17dd656699d26e02a77bdfa00b8c01f546d47cf3e8df81a46686e583f4f5710a25048b
-
SSDEEP
1536:vkLciCBVJ8BrPK/WPcIMeitBNZfQZ/uiQ0WMWMN11arJ5qjBgQGfC2b1dVC0CGj:vkL7CBVJiPK/WQTS/s0WMnN11i5q1qa6
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1436 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2736 wrote to memory of 1436 2736 rundll32.exe 82 PID 2736 wrote to memory of 1436 2736 rundll32.exe 82 PID 2736 wrote to memory of 1436 2736 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a1e08ab193b9e219e645959baae15cc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a1e08ab193b9e219e645959baae15cc_JaffaCakes118.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1436
-