Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240708-en -
resource tags
arch:x64arch:x86image:win10v2004-20240708-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 15:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2cf0715d53e144c1f0faffb154880db5_JaffaCakes118.dll
Resource
win7-20240708-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2cf0715d53e144c1f0faffb154880db5_JaffaCakes118.dll
Resource
win10v2004-20240708-en
1 signatures
150 seconds
General
-
Target
2cf0715d53e144c1f0faffb154880db5_JaffaCakes118.dll
-
Size
32KB
-
MD5
2cf0715d53e144c1f0faffb154880db5
-
SHA1
0a57e47ba2a1883d2a253a331df781999937f22b
-
SHA256
081492e38989e22f3e61dd984ccf41bb4b28b84ba66b641ac3daf5992f0ab3f5
-
SHA512
27eaf4c88722886f86472b24c71a0a8f44428cb68577cda304934bcf21d293fa75243b2955dae82a9d7cd3405efc26b4e19d63f14f1426edf1532dd2eca42aaa
-
SSDEEP
768:qCJWA1CqWe0PamHQ267tM/AChqDERIE630:BkA1kPamM7tEhkYRIE6k
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1664 wrote to memory of 3776 1664 rundll32.exe 79 PID 1664 wrote to memory of 3776 1664 rundll32.exe 79 PID 1664 wrote to memory of 3776 1664 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cf0715d53e144c1f0faffb154880db5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cf0715d53e144c1f0faffb154880db5_JaffaCakes118.dll,#12⤵PID:3776
-