Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 08:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
48e9e6c7a1d3a13a6368425a2fadded9_JaffaCakes118.dll
Resource
win7-20240705-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
48e9e6c7a1d3a13a6368425a2fadded9_JaffaCakes118.dll
Resource
win10v2004-20240704-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
48e9e6c7a1d3a13a6368425a2fadded9_JaffaCakes118.dll
-
Size
204KB
-
MD5
48e9e6c7a1d3a13a6368425a2fadded9
-
SHA1
f8496359f87abdd057c5edc9c35e12cdffc55d03
-
SHA256
7dbc22b03e1b10a32d33e5adbce8b9e40bf7380059b7bab089ebf07c7def2762
-
SHA512
be9ba90bf03b4bc14df033a03c720fccb23d028be57ce0950da1b1be6dcafa98723870b2d8c00de1e53cb3d450c93e9f5fa79089930f400654bf8433b6724838
-
SSDEEP
3072:9Ed8TBk7iWpIxdyDI23HdfSkJuYb5+AnPyVL3XHSscxRYjmH0qHpcO5VS82eoEtM:k26JS2py2HoEtOJ
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4896 wrote to memory of 4664 4896 rundll32.exe 83 PID 4896 wrote to memory of 4664 4896 rundll32.exe 83 PID 4896 wrote to memory of 4664 4896 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\48e9e6c7a1d3a13a6368425a2fadded9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\48e9e6c7a1d3a13a6368425a2fadded9_JaffaCakes118.dll,#12⤵PID:4664
-