Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 08:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4d837fdefccbde0f99138d0abd4a8ef5_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
4d837fdefccbde0f99138d0abd4a8ef5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
4d837fdefccbde0f99138d0abd4a8ef5_JaffaCakes118.dll
-
Size
92KB
-
MD5
4d837fdefccbde0f99138d0abd4a8ef5
-
SHA1
c4551215449923d8908c60491241b782f7c4c727
-
SHA256
103887bca257ef1ddbf850d5d8aa0389a6695335f6db8fd3826c86e9f6a24479
-
SHA512
034206f8a4adc357f17fa9f7a75db6e7140f51c3ca76a917d57630e2dcbf41793e60d9589f210518207b2a8e633db2c2afefc5e570d45feb24958e900e2f192a
-
SSDEEP
1536:uTtABR+KtDph3roHJnLh1+VsRk5nEMxToBwjPPhJse4:uTODVDbcHlLh1+V+kb9oBwDDs9
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1796 wrote to memory of 3712 1796 rundll32.exe 83 PID 1796 wrote to memory of 3712 1796 rundll32.exe 83 PID 1796 wrote to memory of 3712 1796 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4d837fdefccbde0f99138d0abd4a8ef5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4d837fdefccbde0f99138d0abd4a8ef5_JaffaCakes118.dll,#12⤵PID:3712
-