Analysis
-
max time kernel
146s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 18:09
Static task
static1
Behavioral task
behavioral1
Sample
4f7a30b375e63afaa14b65f8d6c67bb4_JaffaCakes118.dll
Resource
win7-20240705-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
4f7a30b375e63afaa14b65f8d6c67bb4_JaffaCakes118.dll
Resource
win10v2004-20240709-en
1 signatures
150 seconds
General
-
Target
4f7a30b375e63afaa14b65f8d6c67bb4_JaffaCakes118.dll
-
Size
330KB
-
MD5
4f7a30b375e63afaa14b65f8d6c67bb4
-
SHA1
28cd27788f281d16aac7db3fa49a45ccbaf506fe
-
SHA256
4f6fb99b7604dea80339e1f0c29518875b08277bc1a2c24c2a6db5edaee490fd
-
SHA512
efc7bd322d4ef6a42dfe2e77d57b0d7c102aa3a5697cf6a34ef9b49a91f46468abdca2dfe1ea8db2b7673df21c2c126e9a84a8e7df73650983570aa7a8398d98
-
SSDEEP
3072:DRq1sFAd2gQ5PmBvNZwnnq1gn2RvoXiDzAYgrO1v2F5j8eFu:lq1sFAwgwmBv3wnIgG4oAYxvU54eu
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1304 wrote to memory of 4676 1304 rundll32.exe rundll32.exe PID 1304 wrote to memory of 4676 1304 rundll32.exe rundll32.exe PID 1304 wrote to memory of 4676 1304 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4f7a30b375e63afaa14b65f8d6c67bb4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4f7a30b375e63afaa14b65f8d6c67bb4_JaffaCakes118.dll,#12⤵PID:4676