Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 12:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3d4d5289b5c7fee1e1947b5e2ac2707a_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
3d4d5289b5c7fee1e1947b5e2ac2707a_JaffaCakes118.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
3d4d5289b5c7fee1e1947b5e2ac2707a_JaffaCakes118.dll
-
Size
15KB
-
MD5
3d4d5289b5c7fee1e1947b5e2ac2707a
-
SHA1
46987c94649328406e37eba4768b179710148c71
-
SHA256
3203c60d7b2acad5c590fed9742c6a03dec7ab7b4afa6dd46a7358e4ea55d515
-
SHA512
17a04f235c64a9bcdeba32b0d5bb4e14e611a635e034fbe845292541ab84016e6ee7b188a18601391d156bb4ae8ddcde36807b82ee417ee0ebfc34e42660aca4
-
SSDEEP
192:nJ461A/0LiwxqfKD6Vk/gqWhiQ7SH92s2APwdslQjcW1Xg3J:yx0iwxqsRQmH92sPAslAzR8
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1868 wrote to memory of 772 1868 rundll32.exe 83 PID 1868 wrote to memory of 772 1868 rundll32.exe 83 PID 1868 wrote to memory of 772 1868 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d4d5289b5c7fee1e1947b5e2ac2707a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d4d5289b5c7fee1e1947b5e2ac2707a_JaffaCakes118.dll,#12⤵PID:772
-