Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
5ab419295ad7cdb52ec33d8443baa34c_JaffaCakes118.dll
Resource
win7-20240708-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
5ab419295ad7cdb52ec33d8443baa34c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
1 signatures
150 seconds
General
-
Target
5ab419295ad7cdb52ec33d8443baa34c_JaffaCakes118.dll
-
Size
18KB
-
MD5
5ab419295ad7cdb52ec33d8443baa34c
-
SHA1
52be24d03588113289f78d0eebce4641dd0fefe4
-
SHA256
c7e365bcad23cb5b97f010541ca8b4c3495eadd2eb4c71a3a8f2e1d33c92621e
-
SHA512
a27b4aebc606bb6ac984f4685dd82aa21b929f8874cda6686b3994e81c16e5de5b24f37290e8d98680fabb990306d08d93db8a31d0e82a6e71a277ce3064c8e3
-
SSDEEP
192:krNSP/LFFMHkgwWisC2j+MQ03X7q6CkqyS1qT3xZHAyowJL/cu7RZgjlbraaw+vM:ZQHkgwoC2j+Mdrq6P3IYJLca6jU4eM0
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2804 1640 rundll32.exe 84 PID 1640 wrote to memory of 2804 1640 rundll32.exe 84 PID 1640 wrote to memory of 2804 1640 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ab419295ad7cdb52ec33d8443baa34c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ab419295ad7cdb52ec33d8443baa34c_JaffaCakes118.dll,#12⤵PID:2804
-