Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 05:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
665e0b1e031460fea258e674805b6224_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
665e0b1e031460fea258e674805b6224_JaffaCakes118.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
665e0b1e031460fea258e674805b6224_JaffaCakes118.dll
-
Size
20KB
-
MD5
665e0b1e031460fea258e674805b6224
-
SHA1
a22d701fb3df38970e2cc1d16e70ee164c580a84
-
SHA256
9ee10c9e20706d09be97c38fd91e18388d16671ce8f170c3b2b70ed10aaa5314
-
SHA512
0efc463d0e711fe414e6e68695279b79b98b91524a99ac3c77b9c95cd994c9b2764238f183d62ea8d3d98293f12a8b486809b72f72cf2897fb5a4a2b24eebde0
-
SSDEEP
384:XSuD/QXU+RmfG1k4TN2pWUJAc7YHs8he2MyPvyAueEZxkVag:X5iU+kT4TT0jcM8wknfueUdg
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2516 1140 rundll32.exe 84 PID 1140 wrote to memory of 2516 1140 rundll32.exe 84 PID 1140 wrote to memory of 2516 1140 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\665e0b1e031460fea258e674805b6224_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\665e0b1e031460fea258e674805b6224_JaffaCakes118.dll,#12⤵PID:2516
-