Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 11:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
62fa0b968f2a8b337d029dcceea7635c_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
62fa0b968f2a8b337d029dcceea7635c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
62fa0b968f2a8b337d029dcceea7635c_JaffaCakes118.dll
-
Size
25KB
-
MD5
62fa0b968f2a8b337d029dcceea7635c
-
SHA1
255c06dfe267cc8de3923fc819ce25f206814140
-
SHA256
ddd19de2579840c4b4f5a4bb13b6b35927b35c5f99f745028c0bb7f41040eb4c
-
SHA512
2d0d1ef2996cae6652f91c6205b9dc3806e5ad75ab08ef0f497a3c4f03956bf9c6cd2d6fdddcc9aec7bfa4fa5a6f8f8665f1f3538542f075d444b99e065cedd3
-
SSDEEP
384:km2PFHaXPBAAgExk1LLg452CNg0VFi/sQfmpM8bDEyO2gIrgYS0o+J+c:CP0udh2LQksQupMkD8tYS0o+Q
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1880 wrote to memory of 3620 1880 rundll32.exe 84 PID 1880 wrote to memory of 3620 1880 rundll32.exe 84 PID 1880 wrote to memory of 3620 1880 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62fa0b968f2a8b337d029dcceea7635c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62fa0b968f2a8b337d029dcceea7635c_JaffaCakes118.dll,#12⤵PID:3620
-