Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 20:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2629aaae55833d0645c4478dddb55168_JaffaCakes118.dll
Resource
win7-20240220-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2629aaae55833d0645c4478dddb55168_JaffaCakes118.dll
Resource
win10v2004-20240704-en
1 signatures
150 seconds
General
-
Target
2629aaae55833d0645c4478dddb55168_JaffaCakes118.dll
-
Size
66KB
-
MD5
2629aaae55833d0645c4478dddb55168
-
SHA1
f3e1c9d7e3d3a8448ade21757177bb13c93eb6b6
-
SHA256
43688c6da0928750b76704aa30e5b0282f3e7b0ad3f1dc311d278e2297e40337
-
SHA512
45ed7053ebc75f8ab3cfb7dd21ef2085e8d2c371aa9824e3bec9f3772914ef60844c286556fbb9623af88a45ef5a25e2ab197420a9e4b79aeabb3801042d4e9c
-
SSDEEP
1536:CCdV9lbtEjWFe/mbPPZytER9Sdx30I9Mm9/kpao/EWbLo:FL0IpPZ7R9A3fMakpao/BH
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5044 wrote to memory of 3184 5044 rundll32.exe 80 PID 5044 wrote to memory of 3184 5044 rundll32.exe 80 PID 5044 wrote to memory of 3184 5044 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2629aaae55833d0645c4478dddb55168_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2629aaae55833d0645c4478dddb55168_JaffaCakes118.dll,#12⤵PID:3184
-