Analysis
-
max time kernel
92s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
2cb701b545913d12561204a1c9e24079_JaffaCakes118.dll
Resource
win7-20240704-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2cb701b545913d12561204a1c9e24079_JaffaCakes118.dll
Resource
win10v2004-20240704-en
1 signatures
150 seconds
General
-
Target
2cb701b545913d12561204a1c9e24079_JaffaCakes118.dll
-
Size
94KB
-
MD5
2cb701b545913d12561204a1c9e24079
-
SHA1
187935a3e7cf88b18450143bfede16d1ca789491
-
SHA256
1a95be1cfac66bca17d7e54921632aa9949a7370455f4fffebb33f12db73ff4f
-
SHA512
b682f072905168a74699359a4304444f24bcc307762a0443dcdf779e8d31b5ec3fa871e06ee9c33a8a50a3a070eca4a15ddbaea6739a788b4ef0effcf738b537
-
SSDEEP
1536:Ou2d+l6COWy+S+PjPHo3Pu5GnnNkvllkSW3vJjIoxWVMEqlKwjbUf16wChccFqkq:Or4lyWy+S+PjPHo3Pu5GnnNkvllkScvy
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4508 wrote to memory of 4156 4508 rundll32.exe 82 PID 4508 wrote to memory of 4156 4508 rundll32.exe 82 PID 4508 wrote to memory of 4156 4508 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cb701b545913d12561204a1c9e24079_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cb701b545913d12561204a1c9e24079_JaffaCakes118.dll,#12⤵PID:4156
-