Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 18:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
292b5a6e2104d7bbffc27b9c26ac18c6_JaffaCakes118.dll
Resource
win7-20240220-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
292b5a6e2104d7bbffc27b9c26ac18c6_JaffaCakes118.dll
Resource
win10v2004-20240704-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
292b5a6e2104d7bbffc27b9c26ac18c6_JaffaCakes118.dll
-
Size
20KB
-
MD5
292b5a6e2104d7bbffc27b9c26ac18c6
-
SHA1
4b68ead5a9fa4e561039013c4ae6460286601f9f
-
SHA256
b91b0c989653fc38623e4954a9117f2a49bf7388fb9d2222d60e8e1541d5b646
-
SHA512
b30a9a0473dce77faae392db9114472cfcf0c54814350fa6c0a06d6bf29dcb064ae28260232dc1e8e0d815772002499f69349e881dd1800dac44856ee47a7a0f
-
SSDEEP
384:e2yYghZLs3u4LOL3OKma+8B90/MuA512scepOjwP7NiG6SsakkxIB:e21gvwkL3wcBi/MuAWhEjwGDRxI
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4332 wrote to memory of 2968 4332 rundll32.exe 82 PID 4332 wrote to memory of 2968 4332 rundll32.exe 82 PID 4332 wrote to memory of 2968 4332 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\292b5a6e2104d7bbffc27b9c26ac18c6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\292b5a6e2104d7bbffc27b9c26ac18c6_JaffaCakes118.dll,#12⤵PID:2968
-