Analysis
-
max time kernel
98s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 16:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
39d2c75050a929ac6e9f6efd759fd7c6_JaffaCakes118.dll
Resource
win7-20240704-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
39d2c75050a929ac6e9f6efd759fd7c6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
1 signatures
150 seconds
General
-
Target
39d2c75050a929ac6e9f6efd759fd7c6_JaffaCakes118.dll
-
Size
758KB
-
MD5
39d2c75050a929ac6e9f6efd759fd7c6
-
SHA1
1c15cbb7ebb46df50a742d029f492ae3ee3695e4
-
SHA256
e8f06d5cb550af23c21948c1e79a5f142fb46cc13d8355d4a20f8b9110371e94
-
SHA512
548de8877d9faaa09b2545b5bd7c5ddc1dcd6d5fe7d33e2b27eb6ec270c2a6e80f8b24695c4f62ad5f4cc9d157e80068f916b883dc4dfb08f15cd01c9b844165
-
SSDEEP
192:w7ClDrb3lHuC3smUVzgEKAxiILpLtFQOEvR3kiCgdgPpHcKXWXUbd+QbK6T:w7CZsC3sJXxi6N6dq9cKBbg6T
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3640 wrote to memory of 3768 3640 rundll32.exe 83 PID 3640 wrote to memory of 3768 3640 rundll32.exe 83 PID 3640 wrote to memory of 3768 3640 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39d2c75050a929ac6e9f6efd759fd7c6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39d2c75050a929ac6e9f6efd759fd7c6_JaffaCakes118.dll,#12⤵PID:3768
-