Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 10:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5b8e43d6f8512ea4066a981f17883cfb_JaffaCakes118.dll
Resource
win7-20240708-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
5b8e43d6f8512ea4066a981f17883cfb_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
5b8e43d6f8512ea4066a981f17883cfb_JaffaCakes118.dll
-
Size
86KB
-
MD5
5b8e43d6f8512ea4066a981f17883cfb
-
SHA1
169e5af7c160751bd35ff537459d2ec625dede7f
-
SHA256
80a6b64ff559e2acee13cb3bfe1994b7339042efc9866049051493ef7f1d817a
-
SHA512
7fffc77901d6938e39f5d4ba0438bc1003d54d91179e61d3e2ef63d81ae3f578e1dff329eac18339a58b547ce420604cee94776789b69798d614b75b58ad1dff
-
SSDEEP
1536:bq+dX5z9lhsRbarmsapZyWK+0IStWJ+xruajIDUsL+JjiHq0VaO1FsPRFDmu+Tw:bbdRhsRwmsmB4tCailUsLHq0VaODQf
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4060 rundll32.exe 4060 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1816 wrote to memory of 4060 1816 rundll32.exe 84 PID 1816 wrote to memory of 4060 1816 rundll32.exe 84 PID 1816 wrote to memory of 4060 1816 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b8e43d6f8512ea4066a981f17883cfb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b8e43d6f8512ea4066a981f17883cfb_JaffaCakes118.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4060
-