Analysis
-
max time kernel
51s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 14:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
06e1bd6c224283c85ca607ed3298f3c3_JaffaCakes118.dll
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
06e1bd6c224283c85ca607ed3298f3c3_JaffaCakes118.dll
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
06e1bd6c224283c85ca607ed3298f3c3_JaffaCakes118.dll
-
Size
152KB
-
MD5
06e1bd6c224283c85ca607ed3298f3c3
-
SHA1
f28e549d222f322d8af15ee402c7c62883b50674
-
SHA256
4a3016f73506be59e8b21573b15da5a76910304c2372557d305c1cabebb16335
-
SHA512
2398dba556a21a9c3de9483e2480c1560d94f676ea26457dee5c33b39c23d5ac5b22416d0cae6cfbbfc506e291ab056520f12194db3373d4499e0e20a35723f7
-
SSDEEP
3072:YGHQG5cU74EOAP5VHjiXkj+oRSeR4Hvn5BR5eOu/6gaZ6toKh:Y8T5cTE7bB1u/XPeP2Z6to
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 5096 5052 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1344 wrote to memory of 5052 1344 rundll32.exe 81 PID 1344 wrote to memory of 5052 1344 rundll32.exe 81 PID 1344 wrote to memory of 5052 1344 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06e1bd6c224283c85ca607ed3298f3c3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06e1bd6c224283c85ca607ed3298f3c3_JaffaCakes118.dll,#12⤵PID:5052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 5923⤵
- Program crash
PID:5096
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5052 -ip 50521⤵PID:4236