Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 18:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3e7cdcedb38526e2c61489aae988e28e_JaffaCakes118.dll
Resource
win7-20240708-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
3e7cdcedb38526e2c61489aae988e28e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
3e7cdcedb38526e2c61489aae988e28e_JaffaCakes118.dll
-
Size
5KB
-
MD5
3e7cdcedb38526e2c61489aae988e28e
-
SHA1
1538550dee34d948be148a7fd6db47c82395fe72
-
SHA256
a9873d4025b48dd7fc7596da87f72d8a5f42a920560894bfeaee5689444567a7
-
SHA512
49e358ed9fd68ba87e15c749f452863b1d34e3745b9c87fd4a2c7138fe3942cadd620dc4b08e54047fe236c41563c0a8f5578cf245d5356ab1f509ed75ffbe6c
-
SSDEEP
96:Z1bZk1VcHK9Cc5Unb3tolhjnlcxLWgwv:21Vcq9Cc583ClhJ8I
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4408 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 396 wrote to memory of 4408 396 rundll32.exe 83 PID 396 wrote to memory of 4408 396 rundll32.exe 83 PID 396 wrote to memory of 4408 396 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e7cdcedb38526e2c61489aae988e28e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e7cdcedb38526e2c61489aae988e28e_JaffaCakes118.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4408
-