Analysis Overview
SHA256
bbd73cf8f460e2586e199d19421f14b87fafbe4314d4ef36af3ad88091e14a70
Threat Level: Shows suspicious behavior
The file 50e7acd8bf569e66de9b31a24d80eea1_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
ASPack v2.12-2.42
Unsigned PE
Program crash
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-05-17 18:38
Signatures
ASPack v2.12-2.42
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral4
Detonation Overview
Submitted
2024-05-17 18:38
Reported
2024-05-17 18:40
Platform
win10v2004-20240426-en
Max time kernel
136s
Max time network
146s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4632 wrote to memory of 3744 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4632 wrote to memory of 3744 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4632 wrote to memory of 3744 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\Thegrideon.Lotus.123.Password.v1.3_CRKEXE-FFF\armaccess.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\Thegrideon.Lotus.123.Password.v1.3_CRKEXE-FFF\armaccess.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 234.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| NL | 23.62.61.113:443 | www.bing.com | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 113.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
Files
memory/3744-13-0x0000000002DD0000-0x0000000002DD1000-memory.dmp
memory/3744-12-0x00000000033F0000-0x00000000033F1000-memory.dmp
memory/3744-11-0x00000000033F0000-0x00000000033F1000-memory.dmp
memory/3744-10-0x00000000033F0000-0x00000000033F1000-memory.dmp
memory/3744-9-0x00000000033F0000-0x00000000033F1000-memory.dmp
memory/3744-8-0x00000000033F0000-0x00000000033F1000-memory.dmp
memory/3744-7-0x0000000002DC0000-0x0000000002DC1000-memory.dmp
memory/3744-6-0x0000000002E20000-0x0000000002E21000-memory.dmp
memory/3744-5-0x0000000002DB0000-0x0000000002DB1000-memory.dmp
memory/3744-4-0x0000000002DF0000-0x0000000002DF1000-memory.dmp
memory/3744-3-0x0000000002C50000-0x0000000002C51000-memory.dmp
memory/3744-2-0x0000000002E10000-0x0000000002E11000-memory.dmp
memory/3744-1-0x0000000002C60000-0x0000000002CAB000-memory.dmp
memory/3744-0-0x000000000FFF0000-0x0000000010030000-memory.dmp
memory/3744-14-0x00000000033E0000-0x00000000033E1000-memory.dmp
memory/3744-24-0x0000000002F50000-0x0000000002F51000-memory.dmp
memory/3744-36-0x00000000033E0000-0x00000000033E1000-memory.dmp
memory/3744-35-0x00000000033E0000-0x00000000033E1000-memory.dmp
memory/3744-37-0x0000000001170000-0x0000000001171000-memory.dmp
memory/3744-34-0x00000000033E0000-0x00000000033E1000-memory.dmp
memory/3744-33-0x00000000033E0000-0x00000000033E1000-memory.dmp
memory/3744-32-0x00000000033E0000-0x00000000033E1000-memory.dmp
memory/3744-31-0x00000000033E0000-0x00000000033E1000-memory.dmp
memory/3744-30-0x00000000033E0000-0x00000000033E1000-memory.dmp
memory/3744-29-0x00000000033E0000-0x00000000033E1000-memory.dmp
memory/3744-28-0x0000000002EB0000-0x0000000002EB1000-memory.dmp
memory/3744-27-0x0000000002F30000-0x0000000002F31000-memory.dmp
memory/3744-26-0x0000000002F20000-0x0000000002F21000-memory.dmp
memory/3744-25-0x0000000002F10000-0x0000000002F11000-memory.dmp
memory/3744-23-0x0000000002F00000-0x0000000002F01000-memory.dmp
memory/3744-22-0x0000000002F40000-0x0000000002F41000-memory.dmp
memory/3744-21-0x0000000002E60000-0x0000000002E61000-memory.dmp
memory/3744-20-0x0000000002EA0000-0x0000000002EA1000-memory.dmp
memory/3744-19-0x0000000002E70000-0x0000000002E71000-memory.dmp
memory/3744-18-0x0000000002ED0000-0x0000000002ED1000-memory.dmp
memory/3744-17-0x0000000002E50000-0x0000000002E51000-memory.dmp
memory/3744-16-0x0000000002EC0000-0x0000000002EC1000-memory.dmp
memory/3744-15-0x0000000002E90000-0x0000000002E91000-memory.dmp
memory/3744-38-0x0000000001170000-0x0000000001171000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-17 18:38
Reported
2024-05-17 18:40
Platform
win7-20240221-en
Max time kernel
140s
Max time network
118s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\Thegrideon.Lotus.123.Password.v1.3_CRKEXE-FFF\123Pass.exe |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1504 wrote to memory of 2448 | N/A | C:\Users\Admin\AppData\Local\Temp\Thegrideon.Lotus.123.Password.v1.3_CRKEXE-FFF\123Pass.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 1504 wrote to memory of 2448 | N/A | C:\Users\Admin\AppData\Local\Temp\Thegrideon.Lotus.123.Password.v1.3_CRKEXE-FFF\123Pass.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 1504 wrote to memory of 2448 | N/A | C:\Users\Admin\AppData\Local\Temp\Thegrideon.Lotus.123.Password.v1.3_CRKEXE-FFF\123Pass.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 1504 wrote to memory of 2448 | N/A | C:\Users\Admin\AppData\Local\Temp\Thegrideon.Lotus.123.Password.v1.3_CRKEXE-FFF\123Pass.exe | C:\Windows\SysWOW64\WerFault.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\Thegrideon.Lotus.123.Password.v1.3_CRKEXE-FFF\123Pass.exe
"C:\Users\Admin\AppData\Local\Temp\Thegrideon.Lotus.123.Password.v1.3_CRKEXE-FFF\123Pass.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 216
Network
Files
memory/1504-0-0x0000000000400000-0x0000000000520000-memory.dmp
memory/1504-1-0x0000000000350000-0x000000000039B000-memory.dmp
memory/1504-8-0x0000000000280000-0x0000000000281000-memory.dmp
memory/1504-9-0x0000000002800000-0x0000000002801000-memory.dmp
memory/1504-7-0x00000000003F0000-0x00000000003F1000-memory.dmp
memory/1504-6-0x0000000000270000-0x0000000000271000-memory.dmp
memory/1504-5-0x00000000003C0000-0x00000000003C1000-memory.dmp
memory/1504-4-0x0000000000260000-0x0000000000261000-memory.dmp
memory/1504-3-0x00000000003E0000-0x00000000003E1000-memory.dmp
memory/1504-2-0x00000000003B0000-0x00000000003B1000-memory.dmp
memory/1504-46-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-70-0x00000000005F0000-0x00000000005F1000-memory.dmp
memory/1504-69-0x0000000002340000-0x0000000002341000-memory.dmp
memory/1504-68-0x0000000002330000-0x0000000002331000-memory.dmp
memory/1504-67-0x0000000002320000-0x0000000002321000-memory.dmp
memory/1504-66-0x0000000002360000-0x0000000002361000-memory.dmp
memory/1504-65-0x0000000002310000-0x0000000002311000-memory.dmp
memory/1504-64-0x0000000002380000-0x0000000002381000-memory.dmp
memory/1504-63-0x0000000002350000-0x0000000002351000-memory.dmp
memory/1504-62-0x0000000000550000-0x0000000000551000-memory.dmp
memory/1504-61-0x00000000005E0000-0x00000000005E1000-memory.dmp
memory/1504-60-0x0000000000560000-0x0000000000561000-memory.dmp
memory/1504-59-0x0000000000610000-0x0000000000611000-memory.dmp
memory/1504-58-0x0000000000540000-0x0000000000541000-memory.dmp
memory/1504-57-0x0000000000600000-0x0000000000601000-memory.dmp
memory/1504-56-0x00000000005C0000-0x00000000005C1000-memory.dmp
memory/1504-55-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-54-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-53-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-52-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-51-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-50-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-49-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-48-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-47-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-45-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-44-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-43-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-42-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-41-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-40-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-39-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-38-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-37-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-36-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-35-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-34-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-33-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-32-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-31-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-30-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-29-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-28-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-27-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-26-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-25-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-24-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-23-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-22-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-21-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-20-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-19-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-18-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-17-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-16-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-15-0x00000000027F0000-0x00000000027F1000-memory.dmp
memory/1504-14-0x0000000002800000-0x0000000002801000-memory.dmp
memory/1504-13-0x0000000002800000-0x0000000002801000-memory.dmp
memory/1504-12-0x0000000002800000-0x0000000002801000-memory.dmp
memory/1504-11-0x0000000002800000-0x0000000002801000-memory.dmp
memory/1504-10-0x00000000003A0000-0x00000000003A1000-memory.dmp
memory/1504-71-0x0000000000400000-0x0000000000520000-memory.dmp
memory/1504-72-0x0000000000350000-0x000000000039B000-memory.dmp
memory/1504-74-0x0000000002800000-0x0000000002801000-memory.dmp
memory/1504-75-0x00000000027F0000-0x00000000027F1000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-17 18:38
Reported
2024-05-17 18:41
Platform
win10v2004-20240508-en
Max time kernel
141s
Max time network
123s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\Thegrideon.Lotus.123.Password.v1.3_CRKEXE-FFF\123Pass.exe
"C:\Users\Admin\AppData\Local\Temp\Thegrideon.Lotus.123.Password.v1.3_CRKEXE-FFF\123Pass.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| NL | 23.62.61.155:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 155.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
Files
memory/2068-0-0x0000000000400000-0x0000000000520000-memory.dmp
memory/2068-1-0x00000000021F0000-0x000000000223B000-memory.dmp
memory/2068-28-0x00000000008F0000-0x00000000008F1000-memory.dmp
memory/2068-27-0x0000000000850000-0x0000000000851000-memory.dmp
memory/2068-26-0x0000000002420000-0x0000000002421000-memory.dmp
memory/2068-25-0x00000000024A0000-0x00000000024A1000-memory.dmp
memory/2068-24-0x0000000002490000-0x0000000002491000-memory.dmp
memory/2068-23-0x0000000002480000-0x0000000002481000-memory.dmp
memory/2068-22-0x00000000024C0000-0x00000000024C1000-memory.dmp
memory/2068-2-0x0000000000400000-0x0000000000520000-memory.dmp
memory/2068-21-0x0000000002470000-0x0000000002471000-memory.dmp
memory/2068-20-0x00000000024B0000-0x00000000024B1000-memory.dmp
memory/2068-19-0x00000000023C0000-0x00000000023C1000-memory.dmp
memory/2068-18-0x0000000002410000-0x0000000002411000-memory.dmp
memory/2068-17-0x00000000023D0000-0x00000000023D1000-memory.dmp
memory/2068-16-0x0000000002440000-0x0000000002441000-memory.dmp
memory/2068-15-0x00000000023B0000-0x00000000023B1000-memory.dmp
memory/2068-14-0x0000000002430000-0x0000000002431000-memory.dmp
memory/2068-13-0x0000000002400000-0x0000000002401000-memory.dmp
memory/2068-12-0x0000000002950000-0x0000000002953000-memory.dmp
memory/2068-11-0x0000000000930000-0x0000000000931000-memory.dmp
memory/2068-10-0x0000000002960000-0x0000000002961000-memory.dmp
memory/2068-9-0x0000000000920000-0x0000000000921000-memory.dmp
memory/2068-8-0x0000000002380000-0x0000000002381000-memory.dmp
memory/2068-7-0x0000000000910000-0x0000000000911000-memory.dmp
memory/2068-6-0x0000000002350000-0x0000000002351000-memory.dmp
memory/2068-5-0x0000000000900000-0x0000000000901000-memory.dmp
memory/2068-4-0x0000000002370000-0x0000000002371000-memory.dmp
memory/2068-3-0x0000000002340000-0x0000000002341000-memory.dmp
memory/2068-29-0x000000000FFF0000-0x0000000010030000-memory.dmp
memory/2068-30-0x0000000000400000-0x0000000000520000-memory.dmp
memory/2068-32-0x00000000021F0000-0x000000000223B000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-05-17 18:38
Reported
2024-05-17 18:41
Platform
win7-20240221-en
Max time kernel
117s
Max time network
121s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1524 wrote to memory of 2024 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1524 wrote to memory of 2024 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1524 wrote to memory of 2024 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1524 wrote to memory of 2024 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1524 wrote to memory of 2024 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1524 wrote to memory of 2024 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1524 wrote to memory of 2024 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\Thegrideon.Lotus.123.Password.v1.3_CRKEXE-FFF\armaccess.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\Thegrideon.Lotus.123.Password.v1.3_CRKEXE-FFF\armaccess.dll,#1
Network
Files
memory/2024-0-0x000000000FFF0000-0x0000000010030000-memory.dmp
memory/2024-1-0x000000000FFFB000-0x000000000FFFC000-memory.dmp
memory/2024-6-0x000000000FFF0000-0x0000000010030000-memory.dmp
memory/2024-5-0x000000000FFF0000-0x0000000010030000-memory.dmp
memory/2024-4-0x000000000FFF0000-0x0000000010030000-memory.dmp
memory/2024-3-0x000000000FFF0000-0x0000000010030000-memory.dmp
memory/2024-2-0x000000000FFF0000-0x0000000010030000-memory.dmp
memory/2024-7-0x000000000FFF0000-0x0000000010030000-memory.dmp