Analysis
-
max time kernel
137s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 18:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
61016bece947046c78fa225d9189499e_JaffaCakes118.dll
Resource
win7-20240704-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
61016bece947046c78fa225d9189499e_JaffaCakes118.dll
Resource
win10v2004-20240704-en
1 signatures
150 seconds
General
-
Target
61016bece947046c78fa225d9189499e_JaffaCakes118.dll
-
Size
238KB
-
MD5
61016bece947046c78fa225d9189499e
-
SHA1
b8b287151245448ec39d2db40935afdbfbdedb95
-
SHA256
567e123cc7c2b8781127ad5e512640db34b1005286e1ecfb2eb6a31fbe265a2d
-
SHA512
dc1ca9959bc2d10c38d367b5b928656536734641b7801b843eec71677eb04a60a10c049e29a90510c6f7e2a31dc55c5fca80387b6d5da01e0e11529b90f4fd03
-
SSDEEP
3072:s2HvXXx3fcw3G0YHp+AgmpLIQlU/lR/ySQTcMZ3i8w7+0FLX:3PxPr3oIQlKRWcL7+0FLX
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1100 wrote to memory of 4776 1100 regsvr32.exe 83 PID 1100 wrote to memory of 4776 1100 regsvr32.exe 83 PID 1100 wrote to memory of 4776 1100 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\61016bece947046c78fa225d9189499e_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\61016bece947046c78fa225d9189499e_JaffaCakes118.dll2⤵PID:4776
-