Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 14:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fa811f867be5b5041971ea3b1fb96556_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
fa811f867be5b5041971ea3b1fb96556_JaffaCakes118.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
fa811f867be5b5041971ea3b1fb96556_JaffaCakes118.exe
-
Size
308KB
-
MD5
fa811f867be5b5041971ea3b1fb96556
-
SHA1
fbf3e42f00a84f5fd567066f6e676511ce6163ec
-
SHA256
e4934dd317330b132305f4f59729752de12975ba5a826c3184059749a5e0831d
-
SHA512
6c9b7377e61c4f27d7cf2580465bc41ea7c34d2ef9eaff8442f7ab31baa83e868599c64dfedfefd92da2d90d9378bc9cd949347cff1fc6ab56ed398540c6fdde
-
SSDEEP
6144:uP2bvKyCPkpBYR/z1/FUmv5NxdteO3ptFXXP29yalMwQTZx:uP2bvO8PE/V13Lr1XIyalMdx
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2664-0-0x0000000010000000-0x0000000010020000-memory.dmp upx behavioral1/memory/2664-2-0x0000000010000000-0x0000000010020000-memory.dmp upx behavioral1/memory/2664-4-0x0000000010000000-0x0000000010020000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2996 2664 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2996 2664 fa811f867be5b5041971ea3b1fb96556_JaffaCakes118.exe 28 PID 2664 wrote to memory of 2996 2664 fa811f867be5b5041971ea3b1fb96556_JaffaCakes118.exe 28 PID 2664 wrote to memory of 2996 2664 fa811f867be5b5041971ea3b1fb96556_JaffaCakes118.exe 28 PID 2664 wrote to memory of 2996 2664 fa811f867be5b5041971ea3b1fb96556_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa811f867be5b5041971ea3b1fb96556_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa811f867be5b5041971ea3b1fb96556_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 1162⤵
- Program crash
PID:2996
-