Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
395f3c267a33d473f8df7fac26f38cec_JaffaCakes118.dll
Resource
win7-20240705-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
395f3c267a33d473f8df7fac26f38cec_JaffaCakes118.dll
Resource
win10v2004-20240709-en
1 signatures
150 seconds
General
-
Target
395f3c267a33d473f8df7fac26f38cec_JaffaCakes118.dll
-
Size
64KB
-
MD5
395f3c267a33d473f8df7fac26f38cec
-
SHA1
131928ece9b231eb9bbeae39bf9a988c5a86929a
-
SHA256
3fa231d3887c583fcc619ff43008ae2b6f9378fbc0bf6e516f3fcf2bb20d154b
-
SHA512
233c1a92b3a24d270d0dd9a8efcafde9ca07b8108f216eeb4ef6cac8bf893ccf6c72eef53ebc362a61af2802e707d98571d957a9863a77431e878cf29a747ec5
-
SSDEEP
768:gDxP7RMUAFM45QOBH6UL0uPvd79WOtesIr6/Q7odv9:s1635FH6k0uPvdQO8sI+IMdv9
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3456 wrote to memory of 4736 3456 rundll32.exe 83 PID 3456 wrote to memory of 4736 3456 rundll32.exe 83 PID 3456 wrote to memory of 4736 3456 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\395f3c267a33d473f8df7fac26f38cec_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\395f3c267a33d473f8df7fac26f38cec_JaffaCakes118.dll,#12⤵PID:4736
-