Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
a194dea8b0613e3af8c26601f23bbce2_JaffaCakes118.dll
Resource
win7-20240611-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a194dea8b0613e3af8c26601f23bbce2_JaffaCakes118.dll
Resource
win10v2004-20240611-en
2 signatures
150 seconds
General
-
Target
a194dea8b0613e3af8c26601f23bbce2_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
a194dea8b0613e3af8c26601f23bbce2
-
SHA1
1b91c75ce2e9c6218803e1b551a9332ae3bb4e4d
-
SHA256
f297141befb54e875c437461fc22f7670501819106326e600f5095f245e47a9d
-
SHA512
a14834288c8c71997696c5b61590472433ef37245383b0b1ffa9af88aa4e8f1afff2242f936ef48dea04796c024f557083c6a1af38cb9d7ea4b03cab780ee307
-
SSDEEP
24576:NS2RadeAO49mNdsET2QM1bEi06r/AWWao99L2RPP3ThyZui3YGX:NIq40jslQM1bEgNzw9iRPP3ThIui3Ym
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2872 1716 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2648 wrote to memory of 1716 2648 rundll32.exe 28 PID 2648 wrote to memory of 1716 2648 rundll32.exe 28 PID 2648 wrote to memory of 1716 2648 rundll32.exe 28 PID 2648 wrote to memory of 1716 2648 rundll32.exe 28 PID 2648 wrote to memory of 1716 2648 rundll32.exe 28 PID 2648 wrote to memory of 1716 2648 rundll32.exe 28 PID 2648 wrote to memory of 1716 2648 rundll32.exe 28 PID 1716 wrote to memory of 2872 1716 rundll32.exe 29 PID 1716 wrote to memory of 2872 1716 rundll32.exe 29 PID 1716 wrote to memory of 2872 1716 rundll32.exe 29 PID 1716 wrote to memory of 2872 1716 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a194dea8b0613e3af8c26601f23bbce2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a194dea8b0613e3af8c26601f23bbce2_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 2203⤵
- Program crash
PID:2872
-
-