Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 14:39
Static task
static1
Behavioral task
behavioral1
Sample
63a642c8a14b638780727fbe981137e5_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63a642c8a14b638780727fbe981137e5_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
63a642c8a14b638780727fbe981137e5_JaffaCakes118.dll
-
Size
2.8MB
-
MD5
63a642c8a14b638780727fbe981137e5
-
SHA1
87e5fa4a243be08f207ff78e39fcb6403282938a
-
SHA256
7ca0360bed9e03136d837a60415653e63d946ce965dcda6351e5b676691faa89
-
SHA512
9be072809c2b80485b847f1883ec0577f7252ed416be1f8b702527a70c0c6283ddc4c9c4059bc9df4c946b68335d30f15ed3d9d3b36d80ecb7097bdd9dc62c84
-
SSDEEP
49152:3q12+9UuvtLW8y9dyTGV7DOVG4/NBRG9v37aJfKtKIAkQxJorV15vXW7k3j:UhCuhUdyTHG4/NBRG9PuAtKIAkQsrnF
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2564 1156 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3188 wrote to memory of 1156 3188 rundll32.exe rundll32.exe PID 3188 wrote to memory of 1156 3188 rundll32.exe rundll32.exe PID 3188 wrote to memory of 1156 3188 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\63a642c8a14b638780727fbe981137e5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\63a642c8a14b638780727fbe981137e5_JaffaCakes118.dll,#12⤵PID:1156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 6603⤵
- Program crash
PID:2564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1156 -ip 11561⤵PID:1992