Analysis
-
max time kernel
93s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 22:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f470a810b7391146a65391d9390c0b3e_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
f470a810b7391146a65391d9390c0b3e_JaffaCakes118.dll
Resource
win10v2004-20240412-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
f470a810b7391146a65391d9390c0b3e_JaffaCakes118.dll
-
Size
73KB
-
MD5
f470a810b7391146a65391d9390c0b3e
-
SHA1
6fbbbbfb8d19204df46cb7b45a797c04c137754b
-
SHA256
81e05c965d4141756e6477fb105ced1af0c57207f683576a4f8f87b939cf92ef
-
SHA512
1168266b29e78defbe8a257fa034d2689ef51bf85b340bffb4a21fed267cd94efd43dab519db9be1774567e748f98f67cf722561894e715619994325ea4443a9
-
SSDEEP
1536:Sjjl3nwzSuOqBubw/WgT6zMKAOK2lCWcQajhRuP:C5UOq0ukgOK2l7aFQP
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3492 4452 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3804 wrote to memory of 4452 3804 rundll32.exe 85 PID 3804 wrote to memory of 4452 3804 rundll32.exe 85 PID 3804 wrote to memory of 4452 3804 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f470a810b7391146a65391d9390c0b3e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f470a810b7391146a65391d9390c0b3e_JaffaCakes118.dll,#12⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 6003⤵
- Program crash
PID:3492
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4452 -ip 44521⤵PID:3400