Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 19:09
Behavioral task
behavioral1
Sample
001bb4eb45b8ca991623bd1591eaf975_JaffaCakes118.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
001bb4eb45b8ca991623bd1591eaf975_JaffaCakes118.dll
-
Size
205KB
-
MD5
001bb4eb45b8ca991623bd1591eaf975
-
SHA1
2e8885971ff2b0557fd77af4feb0d43cadc66936
-
SHA256
e85ee4cf3127c06aadafd5ebe8b9e201fba8cf631b6fcbcceee34b9f3c1ac0b8
-
SHA512
7b47e15dbc13a486be3eb25f3379fcb6bc810a1c7d45cbd3982f8ec9c2db523cec7a6e5855b0d880c6b7176cf88472dfcd14cc51bd6479fcc4824393f6886892
-
SSDEEP
6144:i8D0fLejhyfFheiMP4jmLMO4pqEOc9YsbIoS:N0fIyfXe7PwRymRIoS
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3648-0-0x0000000000400000-0x0000000000468000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2292 3648 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3584 wrote to memory of 3648 3584 rundll32.exe 83 PID 3584 wrote to memory of 3648 3584 rundll32.exe 83 PID 3584 wrote to memory of 3648 3584 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\001bb4eb45b8ca991623bd1591eaf975_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\001bb4eb45b8ca991623bd1591eaf975_JaffaCakes118.dll,#12⤵PID:3648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 5443⤵
- Program crash
PID:2292
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3648 -ip 36481⤵PID:3220