Analysis
-
max time kernel
92s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
5beb8c666aec505a1daafda9471bfac3_JaffaCakes118.dll
Resource
win7-20240705-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
5beb8c666aec505a1daafda9471bfac3_JaffaCakes118.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
5beb8c666aec505a1daafda9471bfac3_JaffaCakes118.dll
-
Size
340KB
-
MD5
5beb8c666aec505a1daafda9471bfac3
-
SHA1
c1adbaf767cc1a7728bdeff79bacf1738a8232ca
-
SHA256
6dba04745dbdfad4af660bb58575c0a28066d4d99a4909a079e1c93553d8a0e2
-
SHA512
b728338b6e3bd7dd5338cc30105c0076e12c1863bbd4d12e193419552418a4cf9d8ed9145defa5bca131196445696baa9edb2d2e1b7baaef12abd5acfd0b57f1
-
SSDEEP
3072:WvA1p08RqEQAIVEd2gG/vNlo0JFx/pANyCm0PQEKR/JnXHWP:W206xWgGxLxWN40PDKR/JnX2P
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1764 wrote to memory of 3828 1764 rundll32.exe 84 PID 1764 wrote to memory of 3828 1764 rundll32.exe 84 PID 1764 wrote to memory of 3828 1764 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5beb8c666aec505a1daafda9471bfac3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5beb8c666aec505a1daafda9471bfac3_JaffaCakes118.dll,#12⤵PID:3828
-