Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 18:24
Static task
static1
Behavioral task
behavioral1
Sample
6bdb904000e44ae34208546dd7b34183_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6bdb904000e44ae34208546dd7b34183_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6bdb904000e44ae34208546dd7b34183_JaffaCakes118.exe
-
Size
23KB
-
MD5
6bdb904000e44ae34208546dd7b34183
-
SHA1
d013cb720cf91ca6856c5e23aa49f06bea802001
-
SHA256
b1f581996f773dbf6bcad332300b05cc8b283cd38b6f49f05a790df0c1ff4a81
-
SHA512
748c044a89b243abc851314ddbf721774a37243ea305c469f3444cf6be6ded774289355b37d259ebb119a9b0f8dee5d2d964470b14b86163b5f95058ed495e18
-
SSDEEP
192:Vq9G6DCNbk3fU81Mk+m7phNo+o1Ms21aErvfBGVeINh3qfDPRRRRRRRRRRRRRRR4:VqPClcUm+k3U21NrQeqOiwYjt
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2904 2888 WerFault.exe 6bdb904000e44ae34208546dd7b34183_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
6bdb904000e44ae34208546dd7b34183_JaffaCakes118.exedescription pid process target process PID 2888 wrote to memory of 2904 2888 6bdb904000e44ae34208546dd7b34183_JaffaCakes118.exe WerFault.exe PID 2888 wrote to memory of 2904 2888 6bdb904000e44ae34208546dd7b34183_JaffaCakes118.exe WerFault.exe PID 2888 wrote to memory of 2904 2888 6bdb904000e44ae34208546dd7b34183_JaffaCakes118.exe WerFault.exe PID 2888 wrote to memory of 2904 2888 6bdb904000e44ae34208546dd7b34183_JaffaCakes118.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bdb904000e44ae34208546dd7b34183_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6bdb904000e44ae34208546dd7b34183_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 922⤵
- Program crash
PID:2904
-