Analysis
-
max time kernel
41s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2024 12:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
26e5f63afae9d14472e2cfba6018a4ae_JaffaCakes118.dll
Resource
win7-20240419-en
windows7-x64
2 signatures
150 seconds
General
-
Target
26e5f63afae9d14472e2cfba6018a4ae_JaffaCakes118.dll
-
Size
170KB
-
MD5
26e5f63afae9d14472e2cfba6018a4ae
-
SHA1
6ed639042704b92b16169cce26a046ff4bacffe7
-
SHA256
5c5c746e8eb08c6131897e8eae082b4a3c9d7a7c5ad85e864f0683ca07c0f6e3
-
SHA512
ff797bca351739a2ec7a4df7515050af6a0a5c061af167c4f7d06165b277d0d2123694965019b818a2974fd58e794d83f9d1794b6add6fb967c13780734f01bd
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q00:jDgtfRQUHPw06MoV2nwTBlhm8c
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4508 wrote to memory of 1768 4508 rundll32.exe 82 PID 4508 wrote to memory of 1768 4508 rundll32.exe 82 PID 4508 wrote to memory of 1768 4508 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\26e5f63afae9d14472e2cfba6018a4ae_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\26e5f63afae9d14472e2cfba6018a4ae_JaffaCakes118.dll,#12⤵PID:1768
-