Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 10:45
Behavioral task
behavioral1
Sample
38caf00d9b2614b378b5caada277cf2e_JaffaCakes118.dll
Resource
win7-20240704-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
38caf00d9b2614b378b5caada277cf2e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
38caf00d9b2614b378b5caada277cf2e_JaffaCakes118.dll
-
Size
705KB
-
MD5
38caf00d9b2614b378b5caada277cf2e
-
SHA1
630517995fed6a3775f734e6ef32d36d2b20b063
-
SHA256
67c6f0784e3d55341c11ab5174f82df39e7b0a062572ab2cfb4148466c7207cc
-
SHA512
fd56b7572033c6b695fb0cee47dd94019bd716376bca7e9058d41d8978621d65d3644307fe915b6f46cce457415feed1b92de9367af782bf7b8958ab50aaa2cc
-
SSDEEP
12288:LaXF2c2llbHDgmwkD8M8KMnQZJTXxcGsIH4jMw8LuBJsE00yqC1V4o4bHrd:eX32llr6koM8KGQbX+nIYjH8LuBXDy7G
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4084 rundll32.exe 4084 rundll32.exe 4084 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2300 wrote to memory of 4084 2300 rundll32.exe 83 PID 2300 wrote to memory of 4084 2300 rundll32.exe 83 PID 2300 wrote to memory of 4084 2300 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\38caf00d9b2614b378b5caada277cf2e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\38caf00d9b2614b378b5caada277cf2e_JaffaCakes118.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4084
-