Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 05:07
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
4859b81db26bc66143fab98804252731_JaffaCakes118.dll
Resource
win7-20240708-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
4859b81db26bc66143fab98804252731_JaffaCakes118.dll
Resource
win10v2004-20240709-en
1 signatures
150 seconds
General
-
Target
4859b81db26bc66143fab98804252731_JaffaCakes118.dll
-
Size
9KB
-
MD5
4859b81db26bc66143fab98804252731
-
SHA1
de9ca5e91f845e3b575c5773c00902978ec527a2
-
SHA256
4ec95589b98fc95cfda6e0e616183d56c203c6b26edb7bb776adcaedddbe6929
-
SHA512
51094850e4c2a994476bd86a54c467d85114298725be64fd784989759653165ecd9e613106f601342480341283e722a611eef52ff1df8a8f365a8a75064d9620
-
SSDEEP
192:nwaUx0X+n0xWttY/0NjP3zUUFRPt4DyIGLuwzTEx/IkJiqBb/:Yb8ktXj7U+tLIGGV
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3948 wrote to memory of 2628 3948 rundll32.exe 84 PID 3948 wrote to memory of 2628 3948 rundll32.exe 84 PID 3948 wrote to memory of 2628 3948 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4859b81db26bc66143fab98804252731_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4859b81db26bc66143fab98804252731_JaffaCakes118.dll,#12⤵PID:2628
-