Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 05:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
487c05f29bcaee7b9341fd71d9f3d7f3_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
487c05f29bcaee7b9341fd71d9f3d7f3_JaffaCakes118.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
487c05f29bcaee7b9341fd71d9f3d7f3_JaffaCakes118.dll
-
Size
104KB
-
MD5
487c05f29bcaee7b9341fd71d9f3d7f3
-
SHA1
f1fe055830a92b17a7aa25438e3a76177e72a9e4
-
SHA256
ae89cfeabb993fc7299a38d5c1bd70ac1969dfd2e8423fbbfd6d21ab61983b25
-
SHA512
c4cb176acf72b2219745916dcfad18171c16446ba2869b1235687fc50d35612a7c881587fbd8c25832abe70a4c1c3d275281db2bb1b57b58fb276ae4c1e1fc24
-
SSDEEP
3072:avoDlY26SMkTthc73c5TLV+580weZj6x/05UF:FDq26bt0V+5802p0U
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1980 1604 rundll32.exe 83 PID 1604 wrote to memory of 1980 1604 rundll32.exe 83 PID 1604 wrote to memory of 1980 1604 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\487c05f29bcaee7b9341fd71d9f3d7f3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\487c05f29bcaee7b9341fd71d9f3d7f3_JaffaCakes118.dll,#12⤵PID:1980
-