Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 18:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
25c0b351fb1573780b3634d3b76ee98f_JaffaCakes118.dll
Resource
win7-20240508-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
25c0b351fb1573780b3634d3b76ee98f_JaffaCakes118.dll
Resource
win10v2004-20240508-en
1 signatures
150 seconds
General
-
Target
25c0b351fb1573780b3634d3b76ee98f_JaffaCakes118.dll
-
Size
5KB
-
MD5
25c0b351fb1573780b3634d3b76ee98f
-
SHA1
161b06d239ba6c44d5855e869b50c3fd3ad0d6fe
-
SHA256
0371e5de710eb1efc142bba4db1a0382e952d38e3f210b005c172f03176f20af
-
SHA512
354bdef23e08f1793228782c07da05c941ac1711a04c5b66908018d0cf79359757e3b2d8b98c723754f5666fd78f1c368b993b59af9ab430aa156394952b27a9
-
SSDEEP
96:pi9UhmhScmCj0S+zQaqP0R5YyubymJCtJ/L3Et5IuNa/h2MPS9kgcwQwTpX:8OhT805CP25svJCtJ/L36IuNFR9kgUwB
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 744 wrote to memory of 3300 744 rundll32.exe 82 PID 744 wrote to memory of 3300 744 rundll32.exe 82 PID 744 wrote to memory of 3300 744 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25c0b351fb1573780b3634d3b76ee98f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25c0b351fb1573780b3634d3b76ee98f_JaffaCakes118.dll,#12⤵PID:3300
-