Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 13:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fce5d3071d3d17b2f5dd049c17c66c72_JaffaCakes118.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
fce5d3071d3d17b2f5dd049c17c66c72_JaffaCakes118.dll
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
fce5d3071d3d17b2f5dd049c17c66c72_JaffaCakes118.dll
-
Size
25KB
-
MD5
fce5d3071d3d17b2f5dd049c17c66c72
-
SHA1
e33175c866565157a135ce82a2269bd984d12f8c
-
SHA256
a29182befdbe30d92d9a6ee73ea307b3f6b126e9bb8878ab7a358bde24eb6392
-
SHA512
ec68439a0ba7f2f870cd4ccd5980b6167d9ee5f202d716cfec94b358e586a672eb9d85662a6c0621f93e1ae2d862128775e1b743ce2b2da5927f7f207b588dcf
-
SSDEEP
768:l7Kg2lcB2QMhZfuKR6yn9yBO5jsJXhjQEP:lNA/ThZGKRmBaYzj
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4576 1312 WerFault.exe 90 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 652 wrote to memory of 1312 652 rundll32.exe 90 PID 652 wrote to memory of 1312 652 rundll32.exe 90 PID 652 wrote to memory of 1312 652 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fce5d3071d3d17b2f5dd049c17c66c72_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fce5d3071d3d17b2f5dd049c17c66c72_JaffaCakes118.dll,#12⤵PID:1312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1312 -s 5443⤵
- Program crash
PID:4576
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1312 -ip 13121⤵PID:1832
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3624 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:1624