Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 11:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
63097ba532fb034daf24aa4fec9911a6_JaffaCakes118.dll
Resource
win7-20240704-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
63097ba532fb034daf24aa4fec9911a6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
1 signatures
150 seconds
General
-
Target
63097ba532fb034daf24aa4fec9911a6_JaffaCakes118.dll
-
Size
34KB
-
MD5
63097ba532fb034daf24aa4fec9911a6
-
SHA1
7352647de4ccf85ad1ed8577c4e41d7c2ec44757
-
SHA256
309f072c636abad8a546149bf3dc1f0d31f07cccb747e17fd6dbd37942eb969b
-
SHA512
dac46b8d9de7bdb6c7fe8e6ccdce78054f42c327d0840b287a13ffa4681dc417cd839a207ab05bd0683111da1a7f2c8764e11ffe4aabb00b69aac90e17faf299
-
SSDEEP
768:AJOcSsphT92HPYXzNj75ZMfC5Chw09FRst5:AJOHeT8Hm75ZM6U6yFRc5
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1792 wrote to memory of 5060 1792 rundll32.exe 84 PID 1792 wrote to memory of 5060 1792 rundll32.exe 84 PID 1792 wrote to memory of 5060 1792 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\63097ba532fb034daf24aa4fec9911a6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\63097ba532fb034daf24aa4fec9911a6_JaffaCakes118.dll,#12⤵PID:5060
-