Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 06:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
15099519bd62714b3cd8f54090ea83dc_JaffaCakes118.dll
Resource
win7-20240611-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
15099519bd62714b3cd8f54090ea83dc_JaffaCakes118.dll
Resource
win10v2004-20240611-en
1 signatures
150 seconds
General
-
Target
15099519bd62714b3cd8f54090ea83dc_JaffaCakes118.dll
-
Size
496KB
-
MD5
15099519bd62714b3cd8f54090ea83dc
-
SHA1
b0646188083e60a744db46d2bbe279afbae843b2
-
SHA256
1c4716f2f8a624c73ec52b27b27dacc7096dc701c5566b13cb217436c0ec8a04
-
SHA512
ecccb526f26b061483528ea1ddf697180b4b45c8aaa6ffeef00ac20c5a40ad062c79949581bab87a68501334320d5d72ac1afd34098a0d73b4d73b354475775d
-
SSDEEP
6144:Q0n94YrDfCL8HStYHRqOE+ZEcmNgkkPYWoEx1/RnEIEmUgslyKu0V4Yc6KAVLTm5:pBlS+BhZZm4rMu0V45amMTmhAMh
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4844 wrote to memory of 1376 4844 regsvr32.exe 83 PID 4844 wrote to memory of 1376 4844 regsvr32.exe 83 PID 4844 wrote to memory of 1376 4844 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\15099519bd62714b3cd8f54090ea83dc_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\15099519bd62714b3cd8f54090ea83dc_JaffaCakes118.dll2⤵PID:1376
-