Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 11:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
62fd0dde2c9cce8799cba88371870bb2_JaffaCakes118.dll
Resource
win7-20240704-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
62fd0dde2c9cce8799cba88371870bb2_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
62fd0dde2c9cce8799cba88371870bb2_JaffaCakes118.dll
-
Size
9KB
-
MD5
62fd0dde2c9cce8799cba88371870bb2
-
SHA1
a8099ea9108656d1ecf6ee34b592ab62dafb8177
-
SHA256
50252590785872f924ee76c6df17e6ed62087b4cc13b455da9cf77260e565acc
-
SHA512
c1aecfc5dcd1a697f72b8f735cd3cf8f50a75ce886c2f1e4a64440c9dc9f5153b14f3dd447b99bfa65ca3cd659c352cb2e528d1c2467e2d9b0833725b9227a41
-
SSDEEP
96:q1V7dR7uwEU+hCT3GrxZ4MUtPNlz0MdG8EWvdM3IWwG34bb:kuwEt8rsTUtPLzKNWSYWF4bb
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1644 2072 rundll32.exe 30 PID 2072 wrote to memory of 1644 2072 rundll32.exe 30 PID 2072 wrote to memory of 1644 2072 rundll32.exe 30 PID 2072 wrote to memory of 1644 2072 rundll32.exe 30 PID 2072 wrote to memory of 1644 2072 rundll32.exe 30 PID 2072 wrote to memory of 1644 2072 rundll32.exe 30 PID 2072 wrote to memory of 1644 2072 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62fd0dde2c9cce8799cba88371870bb2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62fd0dde2c9cce8799cba88371870bb2_JaffaCakes118.dll,#12⤵PID:1644
-