Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-03-2024 20:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5d91acb715da8501370af725e44d7aa3_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
General
-
Target
5d91acb715da8501370af725e44d7aa3_JaffaCakes118.exe
-
Size
824KB
-
MD5
5d91acb715da8501370af725e44d7aa3
-
SHA1
118d2f7c992f0e5ec16b07fd18c410a9517a60e5
-
SHA256
03e1ef8b9811f1ef7b3561f527f2ab4fd7570b06d91ed7507898c98a9ca4c8f6
-
SHA512
ab56c511b5cb46b0f7e4daec6cec0c62d7c2b96fcde35d14c900aa0c5c81d4da6e506ddbeb7a78a21c69591ebf7dc23198f870bc00c0777ca913f17266b91059
-
SSDEEP
24576:PUFa7K4Jy/fVtktVGPrfO/WxvaXUTcLHFpSYiVtktVGPrfO/WT1:8qMlSyfO/WxyXukHFISyfO/WT
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1032 3068 WerFault.exe 5d91acb715da8501370af725e44d7aa3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
5d91acb715da8501370af725e44d7aa3_JaffaCakes118.exedescription pid process target process PID 3068 wrote to memory of 1032 3068 5d91acb715da8501370af725e44d7aa3_JaffaCakes118.exe WerFault.exe PID 3068 wrote to memory of 1032 3068 5d91acb715da8501370af725e44d7aa3_JaffaCakes118.exe WerFault.exe PID 3068 wrote to memory of 1032 3068 5d91acb715da8501370af725e44d7aa3_JaffaCakes118.exe WerFault.exe PID 3068 wrote to memory of 1032 3068 5d91acb715da8501370af725e44d7aa3_JaffaCakes118.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d91acb715da8501370af725e44d7aa3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d91acb715da8501370af725e44d7aa3_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 1442⤵
- Program crash
PID:1032