Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 17:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b467d21e21a7ab236339ee56b37357c9_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b467d21e21a7ab236339ee56b37357c9_JaffaCakes118.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
b467d21e21a7ab236339ee56b37357c9_JaffaCakes118.dll
-
Size
171KB
-
MD5
b467d21e21a7ab236339ee56b37357c9
-
SHA1
cec11fb5e94fbe6e9f9e5d5ce202bd97b1ca7c5b
-
SHA256
70768e1fe651ecd96fbb5ff60ab92d2d75ffc095cc396accf61847f564aa8e2a
-
SHA512
fe73b8fac988ef5a27666ba6cec127445e3b7fbdc99bc9c5c9d8d6fcecd34e8ed50bc9a884a3986ac72be26bd40d945dc6c5cb7c5150683e92f5bb7a5ca305c5
-
SSDEEP
3072:CqQKCu0Y3q13GPLRkPmKkvppbB07rLpgj75l:VQKb0Y34gNTTbUgjV
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2236 2248 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2248 1728 rundll32.exe 28 PID 1728 wrote to memory of 2248 1728 rundll32.exe 28 PID 1728 wrote to memory of 2248 1728 rundll32.exe 28 PID 1728 wrote to memory of 2248 1728 rundll32.exe 28 PID 1728 wrote to memory of 2248 1728 rundll32.exe 28 PID 1728 wrote to memory of 2248 1728 rundll32.exe 28 PID 1728 wrote to memory of 2248 1728 rundll32.exe 28 PID 2248 wrote to memory of 2236 2248 rundll32.exe 29 PID 2248 wrote to memory of 2236 2248 rundll32.exe 29 PID 2248 wrote to memory of 2236 2248 rundll32.exe 29 PID 2248 wrote to memory of 2236 2248 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b467d21e21a7ab236339ee56b37357c9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b467d21e21a7ab236339ee56b37357c9_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 2283⤵
- Program crash
PID:2236
-
-