Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 04:45
Behavioral task
behavioral1
Sample
32ca301c0ff250331b026d33abf6412c_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
32ca301c0ff250331b026d33abf6412c_JaffaCakes118.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
32ca301c0ff250331b026d33abf6412c_JaffaCakes118.dll
-
Size
773KB
-
MD5
32ca301c0ff250331b026d33abf6412c
-
SHA1
38fc370d5fa23ca9afcfc04a4b9b1a13dec2164b
-
SHA256
b111fddb39832a51bce57cae43d6f86b790702e7903fbb38a38d1951d6b4da7e
-
SHA512
444d379023804613efc7b802542635b5bffca463106726b14b8fa9f6dafff91b554c188194a18bdb51da7fe2c575554888e8e4994e5279cfb6fcfdddc8b087a7
-
SSDEEP
12288:YbW8064VU+P8MYg3183dcbwzVftP6MJXmIn6Vf3ZB3SPR7J0UuTkPx8uCPmRROe+:wCtm+PZ183uTQ8fJVIWUuwPSpuRROe
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2104-0-0x0000000002010000-0x00000000022FC000-memory.dmp upx behavioral1/memory/2104-1-0x0000000002010000-0x00000000022FC000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1768 2104 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 808 wrote to memory of 2104 808 rundll32.exe 28 PID 808 wrote to memory of 2104 808 rundll32.exe 28 PID 808 wrote to memory of 2104 808 rundll32.exe 28 PID 808 wrote to memory of 2104 808 rundll32.exe 28 PID 808 wrote to memory of 2104 808 rundll32.exe 28 PID 808 wrote to memory of 2104 808 rundll32.exe 28 PID 808 wrote to memory of 2104 808 rundll32.exe 28 PID 2104 wrote to memory of 1768 2104 rundll32.exe 29 PID 2104 wrote to memory of 1768 2104 rundll32.exe 29 PID 2104 wrote to memory of 1768 2104 rundll32.exe 29 PID 2104 wrote to memory of 1768 2104 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32ca301c0ff250331b026d33abf6412c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32ca301c0ff250331b026d33abf6412c_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 2563⤵
- Program crash
PID:1768
-
-