Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 20:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
433139c91fde54ab0ac1559c920f980d_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
150 seconds
General
-
Target
433139c91fde54ab0ac1559c920f980d_JaffaCakes118.dll
-
Size
161KB
-
MD5
433139c91fde54ab0ac1559c920f980d
-
SHA1
0d090837698384df87f30b543c56b0d2655d5ac8
-
SHA256
41532ef948b3018d78eabdecf71324b052bf9dc2af3199ec73f57da723ea44ee
-
SHA512
a821bd6eae140e0dde69eae8914c2bde853023f9c2307c7072bad55f83635f2dd03751a5c7cee48a23e75bb9cf955b6042a148819f4d23536d62e7176eb6a4aa
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0Z:jDgtfRQUHPw06MoV2nwTBlhm8B
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2116 wrote to memory of 4000 2116 rundll32.exe 83 PID 2116 wrote to memory of 4000 2116 rundll32.exe 83 PID 2116 wrote to memory of 4000 2116 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\433139c91fde54ab0ac1559c920f980d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\433139c91fde54ab0ac1559c920f980d_JaffaCakes118.dll,#12⤵PID:4000
-