Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 04:00
Behavioral task
behavioral1
Sample
37a0324895962e62f3260ed22de9ffc9_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
37a0324895962e62f3260ed22de9ffc9_JaffaCakes118.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
37a0324895962e62f3260ed22de9ffc9_JaffaCakes118.dll
-
Size
49KB
-
MD5
37a0324895962e62f3260ed22de9ffc9
-
SHA1
b8bbafd6dadd5d2ffd7c7db4992a72f3766c4d81
-
SHA256
d61b1125042cb52055b4bf0b1896f709c54f65c3ac3fc989f9ffaf7e1337ecce
-
SHA512
e1698c56d620746e5c4e82b9a03f50ebd5b47ade94a05d3e51259a56db6ede3898704059ddd483714daeb0e4e71b151c6d5fa3f9eca1d1737f088af8703053dd
-
SSDEEP
768:51DpSktwru+03awWMEKb8UvLTwXYzsIrAKsE61LGLv7NrYykqVmJzf2yltIxydeV:I+hWFKg8kK1eq1YEVCf2ylT
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3600 wrote to memory of 3564 3600 rundll32.exe 83 PID 3600 wrote to memory of 3564 3600 rundll32.exe 83 PID 3600 wrote to memory of 3564 3600 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\37a0324895962e62f3260ed22de9ffc9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\37a0324895962e62f3260ed22de9ffc9_JaffaCakes118.dll,#12⤵PID:3564
-