Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 16:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
42854a6e9549e3ac925e40d532f9dab6_JaffaCakes118.dll
Resource
win7-20240704-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
42854a6e9549e3ac925e40d532f9dab6_JaffaCakes118.dll
Resource
win10v2004-20240704-en
1 signatures
150 seconds
General
-
Target
42854a6e9549e3ac925e40d532f9dab6_JaffaCakes118.dll
-
Size
124KB
-
MD5
42854a6e9549e3ac925e40d532f9dab6
-
SHA1
15b9f6fcc1d8fb5c47bf9ed75e3e1a3eeba1591b
-
SHA256
7deaf88a1e4c67dedb7af231b7ac8ee94216061c75d6470a1eb3debdfccde74f
-
SHA512
0374ef8feea8240789ae1b65671b16e3ac0f3bf38c4e9988a0556ba74a156a9fe1ff9baa87c1fb0f2b63709e5b37e504c71e4d18790fd72fdd7620144eda5afb
-
SSDEEP
3072:bSztJNjUUQFldiwp31K2Rome+DDQ/bDk00mYVb1wpMJuCk8UpG9:YNjUUVY1rGH0mYxvJ4
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2612 wrote to memory of 4876 2612 rundll32.exe 83 PID 2612 wrote to memory of 4876 2612 rundll32.exe 83 PID 2612 wrote to memory of 4876 2612 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\42854a6e9549e3ac925e40d532f9dab6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\42854a6e9549e3ac925e40d532f9dab6_JaffaCakes118.dll,#12⤵PID:4876
-