Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 18:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3e575ce205d2b5b5f3b3bda20fe7d74f_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
3e575ce205d2b5b5f3b3bda20fe7d74f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
3e575ce205d2b5b5f3b3bda20fe7d74f_JaffaCakes118.dll
-
Size
32KB
-
MD5
3e575ce205d2b5b5f3b3bda20fe7d74f
-
SHA1
b156cd473810745b46ec7f5b951637eb57ac53a5
-
SHA256
3454f14c0c4a9900fde1b5b2be9d588a071f0ce29baedd695cdae2eb21c1a33d
-
SHA512
32c4f9fc3ea2b1a5535fed104344b8d7b2102d15af1d54163f3fb6ad579670df5c094ebc8bcc7dc044e59e1d236404cf6fa81e277888ed2fc40f029d0c170aa6
-
SSDEEP
384:Sv2pPkgjqPckzYBiGESxf+IEOFfunjgH8bfEtwkDx:c2dkgjqhY7NZhX8EcoqGx
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1344 1048 rundll32.exe 29 PID 1048 wrote to memory of 1344 1048 rundll32.exe 29 PID 1048 wrote to memory of 1344 1048 rundll32.exe 29 PID 1048 wrote to memory of 1344 1048 rundll32.exe 29 PID 1048 wrote to memory of 1344 1048 rundll32.exe 29 PID 1048 wrote to memory of 1344 1048 rundll32.exe 29 PID 1048 wrote to memory of 1344 1048 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e575ce205d2b5b5f3b3bda20fe7d74f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e575ce205d2b5b5f3b3bda20fe7d74f_JaffaCakes118.dll,#12⤵PID:1344
-