Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 01:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f000d23c4fad4a748f07b9c9c2b7cc03_JaffaCakes118.dll
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
f000d23c4fad4a748f07b9c9c2b7cc03_JaffaCakes118.dll
Resource
win10v2004-20240226-en
1 signatures
150 seconds
General
-
Target
f000d23c4fad4a748f07b9c9c2b7cc03_JaffaCakes118.dll
-
Size
16KB
-
MD5
f000d23c4fad4a748f07b9c9c2b7cc03
-
SHA1
fc5a465fdae2a09067fd01f21132703e0a5646ff
-
SHA256
51f87e044ca598e16658c2239a59379ec270dc09b25800b836a8745ca78736c1
-
SHA512
a69a9ddec64ac8195784c03d1a3d988851ccc4f0a6c8db3d91e57599158c8fd16eca1da5da7260c14b1e03882d5d2b6f0f4eba686bbc132b179cce247440c983
-
SSDEEP
384:1ygVZCZNdOzhbtF+LKxj6h+ytgXfHfZPFS8HTdYpQ:11w4tF56h+ytERPFfTqm
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2204 2212 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2212 3000 rundll32.exe 28 PID 3000 wrote to memory of 2212 3000 rundll32.exe 28 PID 3000 wrote to memory of 2212 3000 rundll32.exe 28 PID 3000 wrote to memory of 2212 3000 rundll32.exe 28 PID 3000 wrote to memory of 2212 3000 rundll32.exe 28 PID 3000 wrote to memory of 2212 3000 rundll32.exe 28 PID 3000 wrote to memory of 2212 3000 rundll32.exe 28 PID 2212 wrote to memory of 2204 2212 rundll32.exe 29 PID 2212 wrote to memory of 2204 2212 rundll32.exe 29 PID 2212 wrote to memory of 2204 2212 rundll32.exe 29 PID 2212 wrote to memory of 2204 2212 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f000d23c4fad4a748f07b9c9c2b7cc03_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f000d23c4fad4a748f07b9c9c2b7cc03_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 2363⤵
- Program crash
PID:2204
-
-