Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 20:20
Behavioral task
behavioral1
Sample
004f5dba4036343535a146c42d86d541_JaffaCakes118.dll
Resource
win7-20240611-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
004f5dba4036343535a146c42d86d541_JaffaCakes118.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
004f5dba4036343535a146c42d86d541_JaffaCakes118.dll
-
Size
751KB
-
MD5
004f5dba4036343535a146c42d86d541
-
SHA1
d913096a68cdb821b167faffbb6504f784c77370
-
SHA256
b4dad11c1ab9bcae1b87109eb598464264fef93111ad213ff99e1d27b8398dc1
-
SHA512
9b57bb548d9c94003e7b0260a798e4ea0a653faac221b1c2f729aae6e3e7e586d862a97680ce056b6cf949b39148902f2f59dd633e4075604af56cd9a7133586
-
SSDEEP
12288:gT3wskWTAIamQO8VbvTv8argChqxWP9A9dnXKFW+mJSXtkFuDiGk:gssdTqfxvj83gPOdXKqJS2FAk
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2816 1488 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1488 2196 rundll32.exe 81 PID 2196 wrote to memory of 1488 2196 rundll32.exe 81 PID 2196 wrote to memory of 1488 2196 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\004f5dba4036343535a146c42d86d541_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\004f5dba4036343535a146c42d86d541_JaffaCakes118.dll,#12⤵PID:1488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 5443⤵
- Program crash
PID:2816
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1488 -ip 14881⤵PID:4484