Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 05:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0cc8894c74d1eb0dbaf5ece706f2873b_JaffaCakes118.dll
Resource
win7-20240508-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
0cc8894c74d1eb0dbaf5ece706f2873b_JaffaCakes118.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
0cc8894c74d1eb0dbaf5ece706f2873b_JaffaCakes118.dll
-
Size
2.3MB
-
MD5
0cc8894c74d1eb0dbaf5ece706f2873b
-
SHA1
661a7a1a790b44cf61f77f5daec9a42b58422bfd
-
SHA256
c79d9f32d95df669a22051223926d73c848355159711663c98ad8760b1eb430b
-
SHA512
db61fd2bebf64b05abaf31ca51ab4282f9ee33f555dcd92a7be3e0a9c823c780cb1f81a6150918dfde6b7d9ce4a1ea2a52db44623cda8cf6b22310c25321d7e0
-
SSDEEP
49152:cF1FhW825PlJ0TJcttcCmIf+u9YZrpk9BRVvdWaiiccTlwcu2EFYG:cFTo82Pb0c0NZrq9BRVvUdowc9G
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4864 wrote to memory of 944 4864 rundll32.exe 81 PID 4864 wrote to memory of 944 4864 rundll32.exe 81 PID 4864 wrote to memory of 944 4864 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0cc8894c74d1eb0dbaf5ece706f2873b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0cc8894c74d1eb0dbaf5ece706f2873b_JaffaCakes118.dll,#12⤵PID:944
-