Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 00:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4765ed8a5d5c94c6dc26d9da13214e8c_JaffaCakes118.dll
Resource
win7-20240708-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
4765ed8a5d5c94c6dc26d9da13214e8c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
4765ed8a5d5c94c6dc26d9da13214e8c_JaffaCakes118.dll
-
Size
314KB
-
MD5
4765ed8a5d5c94c6dc26d9da13214e8c
-
SHA1
32d705c363656aa8f86769d5409f5d3d4c122ef8
-
SHA256
8463667d8208795d277cf0d7e0082a6b6ca233291ecc9297268bbc99c2711871
-
SHA512
158fd46023ae88253a35c7e64553e5e6d959c7d5af80363a80b9cf289188d992a697198340c01773647528233ff53dc836365c2d8c0b270ec68ee500e7ecc06e
-
SSDEEP
6144:iMjsycyX7bweBe/K6iCI5adO/WwkfiKTAQE6MIA+3NUSS/:iMjsycC47iCI5oqPc5MIx6SS/
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2476 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3304 wrote to memory of 2476 3304 rundll32.exe 83 PID 3304 wrote to memory of 2476 3304 rundll32.exe 83 PID 3304 wrote to memory of 2476 3304 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4765ed8a5d5c94c6dc26d9da13214e8c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4765ed8a5d5c94c6dc26d9da13214e8c_JaffaCakes118.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:2476
-