Analysis
-
max time kernel
139s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 07:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
04199025a8beec340374c857b375538d_JaffaCakes118.dll
Resource
win7-20240220-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
04199025a8beec340374c857b375538d_JaffaCakes118.dll
Resource
win10v2004-20240611-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
04199025a8beec340374c857b375538d_JaffaCakes118.dll
-
Size
72KB
-
MD5
04199025a8beec340374c857b375538d
-
SHA1
d9eba3e57760e1a1715d000706e1c2948c7a15e3
-
SHA256
e3f0693c175cb9497baeaf6b08878b29b03137e3f5e4251a295dcbbef9f1bde0
-
SHA512
d221fcaf885ae0ad562c161e795cdfbd1feddb0fd8cf0849a464cee6313c0a87c34b1a7a2e008796839ff82d50ef113d4e54045cc519ac4ea992825750855c0f
-
SSDEEP
1536:Sjjl3nwzSuOqBubw/WgT6zMKAOK2lCWcQajhRuv:C5UOq0ukgOK2l7aFQv
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4180 3456 WerFault.exe 90 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3288 wrote to memory of 3456 3288 rundll32.exe 90 PID 3288 wrote to memory of 3456 3288 rundll32.exe 90 PID 3288 wrote to memory of 3456 3288 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04199025a8beec340374c857b375538d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04199025a8beec340374c857b375538d_JaffaCakes118.dll,#12⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3456 -s 6003⤵
- Program crash
PID:4180
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3456 -ip 34561⤵PID:2868
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4160,i,11069752405888604640,8928124405695604965,262144 --variations-seed-version --mojo-platform-channel-handle=4272 /prefetch:81⤵PID:1032