Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 15:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
22dd830e90dbcf7f5595aea72dbc8b8d_JaffaCakes118.dll
Resource
win7-20240611-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
22dd830e90dbcf7f5595aea72dbc8b8d_JaffaCakes118.dll
Resource
win10v2004-20240508-en
1 signatures
150 seconds
General
-
Target
22dd830e90dbcf7f5595aea72dbc8b8d_JaffaCakes118.dll
-
Size
97KB
-
MD5
22dd830e90dbcf7f5595aea72dbc8b8d
-
SHA1
547967061eae7500df24d10b850bbbd1a18eca9e
-
SHA256
f9e895b34c8963aa886b09fb91231f07b1a1543d1bdc79b040edab4ecc686bf7
-
SHA512
3f19f136a3f6e0ad2b268783c26a538ac6978072e1ad82e44a587a2df6c2d4d161a92dfcd036f0e69c1a5a52c55bb162e44d707e71860ebfdbae3fe920d51bb1
-
SSDEEP
1536:WO+QkG6mjo92aIsGeepk7i23BUfPzPruuj+A1S1GSWwL5JmQ7POr0:WO+57s74epkNsPAAMGSL5JmQ7PR
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4060 wrote to memory of 1804 4060 rundll32.exe 81 PID 4060 wrote to memory of 1804 4060 rundll32.exe 81 PID 4060 wrote to memory of 1804 4060 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22dd830e90dbcf7f5595aea72dbc8b8d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22dd830e90dbcf7f5595aea72dbc8b8d_JaffaCakes118.dll,#12⤵PID:1804
-