Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
07-04-2024 02:31
Behavioral task
behavioral1
Sample
e3dace173ded785a9af4a9007587eec6_JaffaCakes118.dll
Resource
win7-20240319-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
e3dace173ded785a9af4a9007587eec6_JaffaCakes118.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
e3dace173ded785a9af4a9007587eec6_JaffaCakes118.dll
-
Size
159KB
-
MD5
e3dace173ded785a9af4a9007587eec6
-
SHA1
2b746a247ef14585e9102336939e341f62cc6b67
-
SHA256
dce920f5db90efecc7fb7a6b6399c80fc83e3f1251f160cd1295b6a4b67125d4
-
SHA512
da3c9481438b4373c328904aac1ed64a1d20c02a558573543b36fc35a1f296664b518243fe4431b8b19c85678271cc0e7215aae7dd3769d998a45297dccb3b25
-
SSDEEP
3072:+MZgx/c7SKIPuExpL/bZdHXC3e81wBguUqp5uws:1gx/ySfPuExpDbZdHXCe81wDq
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 748 744 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2252 wrote to memory of 744 2252 rundll32.exe 28 PID 2252 wrote to memory of 744 2252 rundll32.exe 28 PID 2252 wrote to memory of 744 2252 rundll32.exe 28 PID 2252 wrote to memory of 744 2252 rundll32.exe 28 PID 2252 wrote to memory of 744 2252 rundll32.exe 28 PID 2252 wrote to memory of 744 2252 rundll32.exe 28 PID 2252 wrote to memory of 744 2252 rundll32.exe 28 PID 744 wrote to memory of 748 744 rundll32.exe 29 PID 744 wrote to memory of 748 744 rundll32.exe 29 PID 744 wrote to memory of 748 744 rundll32.exe 29 PID 744 wrote to memory of 748 744 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e3dace173ded785a9af4a9007587eec6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e3dace173ded785a9af4a9007587eec6_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 2243⤵
- Program crash
PID:748
-
-