Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 19:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
64676617cd8cc5a1cb1632d49d946c6c_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
64676617cd8cc5a1cb1632d49d946c6c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
64676617cd8cc5a1cb1632d49d946c6c_JaffaCakes118.dll
-
Size
13KB
-
MD5
64676617cd8cc5a1cb1632d49d946c6c
-
SHA1
a72b958ac9e1edaea3b8fd5a9d3a34e3f49b3190
-
SHA256
35549164c1192b6749fdcec05945b2dfdaf5557e7fd8c2cd1da02f74072d64b4
-
SHA512
77aa41aa6585e0ab5f8d3ffcac17baad19368cbc44687f743b7dc9e8bbcdc11061eaee7886b2b17a2d1aa50fa13a8eeef437ddbb6e5aa4d7bee2087decd99566
-
SSDEEP
24:eH1GSdFNMy98Fga5sgNfsrsCqtK0TKW4tsJAR/NDMf+n/rx6LArZ0oyC2hBuBe74:ydPEgaLstqY1tn/dLEfuBeuR5c4z
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3892 wrote to memory of 1120 3892 rundll32.exe 84 PID 3892 wrote to memory of 1120 3892 rundll32.exe 84 PID 3892 wrote to memory of 1120 3892 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64676617cd8cc5a1cb1632d49d946c6c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64676617cd8cc5a1cb1632d49d946c6c_JaffaCakes118.dll,#12⤵PID:1120
-