Analysis
-
max time kernel
92s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 05:34
Static task
static1
Behavioral task
behavioral1
Sample
2f269c275fc5344255b1ed0f866cb874_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2f269c275fc5344255b1ed0f866cb874_JaffaCakes118.dll
Resource
win10v2004-20240704-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
2f269c275fc5344255b1ed0f866cb874_JaffaCakes118.dll
-
Size
340KB
-
MD5
2f269c275fc5344255b1ed0f866cb874
-
SHA1
f601f3892cc724c9500c19f77c329739355410f9
-
SHA256
1d0dcd8bf11384d9ffc181175c2bb7353b278dae6d1f3990cec8a99bc3eb492c
-
SHA512
8103ff086de93a126c6b51bb9132b821c8d8fc61fdbe60c1c66b33229cb0b9754df84c9f2f6a93d445bde3bb5454772e6a158ea7087cc89ecd434c7828697e7c
-
SSDEEP
3072:ovA1p08RqEQAIVEd2gG/vNlo0JFx/pANyCm0PQEKR/JnXHWP:o206xWgGxLxWN40PDKR/JnX2P
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4000 wrote to memory of 4636 4000 rundll32.exe 82 PID 4000 wrote to memory of 4636 4000 rundll32.exe 82 PID 4000 wrote to memory of 4636 4000 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f269c275fc5344255b1ed0f866cb874_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f269c275fc5344255b1ed0f866cb874_JaffaCakes118.dll,#12⤵PID:4636
-