Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 22:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3f122a2e942f0c502c7ba435abaf23b1_JaffaCakes118.dll
Resource
win7-20240704-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f122a2e942f0c502c7ba435abaf23b1_JaffaCakes118.dll
Resource
win10v2004-20240709-en
1 signatures
150 seconds
General
-
Target
3f122a2e942f0c502c7ba435abaf23b1_JaffaCakes118.dll
-
Size
42KB
-
MD5
3f122a2e942f0c502c7ba435abaf23b1
-
SHA1
747915aceb9f35cd8f61b99feb1b2ce617bda0d4
-
SHA256
130781fe482a18a15bfa28002ff68a7b0178860d5793a9963795ce36132701f9
-
SHA512
a655fdc04581bf79665c1d7636a6d1721e7ecfb6561fc028524e1ce3f5fa0afd0cb8345215db05808a0344bc59eee683db12239f073bb012fde05d299a5d7aa1
-
SSDEEP
768:My9kY/kPPvr9Ai83D3PbIDJfFuO+Rva+nxhlvqSSClM/DOLC/RuY:My2Y/Eai4s1AO+R9xhlv+DOLC/
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1648 1468 rundll32.exe 83 PID 1468 wrote to memory of 1648 1468 rundll32.exe 83 PID 1468 wrote to memory of 1648 1468 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f122a2e942f0c502c7ba435abaf23b1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f122a2e942f0c502c7ba435abaf23b1_JaffaCakes118.dll,#12⤵PID:1648
-