Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 21:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3abf4c9de74c7a7442bae7024d4212df_JaffaCakes118.dll
Resource
win7-20240708-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
3abf4c9de74c7a7442bae7024d4212df_JaffaCakes118.dll
Resource
win10v2004-20240709-en
1 signatures
150 seconds
General
-
Target
3abf4c9de74c7a7442bae7024d4212df_JaffaCakes118.dll
-
Size
94KB
-
MD5
3abf4c9de74c7a7442bae7024d4212df
-
SHA1
4e940396d118357c6b4b886edc0cb223d1ec7700
-
SHA256
410e88022e01a1ee3b970587d5395986db4125af5a085f65444677fc582a4b22
-
SHA512
40a7824a5912c00ceeeab9b3f50224ca52aa6f37b1f624c6d6d3ecb3c4fcf1e6ae4e076d0aaa9ca1a6ed222a4455285f146e79e0864d03229534342e2adedce6
-
SSDEEP
1536:y+ZQdim+2XZCAaEJwPxK1pPcP4NPXdSr87ilZPSHPw:/ZQDbpEgwPxK1FcAN77i/AI
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4444 wrote to memory of 5028 4444 rundll32.exe 84 PID 4444 wrote to memory of 5028 4444 rundll32.exe 84 PID 4444 wrote to memory of 5028 4444 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3abf4c9de74c7a7442bae7024d4212df_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3abf4c9de74c7a7442bae7024d4212df_JaffaCakes118.dll,#12⤵PID:5028
-