Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 22:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5e0309ed8d2fb82903d7d9bba17951cf_JaffaCakes118.dll
Resource
win7-20240708-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5e0309ed8d2fb82903d7d9bba17951cf_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
5e0309ed8d2fb82903d7d9bba17951cf_JaffaCakes118.dll
-
Size
3KB
-
MD5
5e0309ed8d2fb82903d7d9bba17951cf
-
SHA1
9f539bb8f7508809627a3287a77b9f404f670050
-
SHA256
641db5499bedee68a0c5ed50ccfce981cf18cce6c8a4838f313c85abe9911569
-
SHA512
dee947ed162a5ed1d6781376eb1c3ed6bfa9b474489787db4c720b482cc3b26563b49a4c71eb4258503affa38c447439685e21044e508f843f05e7ff0c6394ec
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4660 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4960 wrote to memory of 4660 4960 rundll32.exe 86 PID 4960 wrote to memory of 4660 4960 rundll32.exe 86 PID 4960 wrote to memory of 4660 4960 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e0309ed8d2fb82903d7d9bba17951cf_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e0309ed8d2fb82903d7d9bba17951cf_JaffaCakes118.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4660
-