Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 10:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
15adbb916f32ea68bb00488f65c0b443_JaffaCakes118.dll
Resource
win7-20240508-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
15adbb916f32ea68bb00488f65c0b443_JaffaCakes118.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
15adbb916f32ea68bb00488f65c0b443_JaffaCakes118.dll
-
Size
62KB
-
MD5
15adbb916f32ea68bb00488f65c0b443
-
SHA1
98f5a3cdcbcb769773b2a7e1e3fba585e0287715
-
SHA256
7ed173c95fb23634a51ee089ce3ef719134dc5110a38585163968e19886d3ee5
-
SHA512
5b1b6bff60e7627c454e6dbbbfb45886fc8367b0f651ebaccabbf060a4d3b13c97794b04a8fc61e4bd3efecb06c9064f2b8dd9a7561594eea7c33f14d7251739
-
SSDEEP
1536:LmnHvSJXQPhIA0DY5q/WT/uWBjTBrTH75tQszj:Lm6J42A0DhWTGWBB4sf
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3936 3528 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1924 wrote to memory of 3528 1924 rundll32.exe 81 PID 1924 wrote to memory of 3528 1924 rundll32.exe 81 PID 1924 wrote to memory of 3528 1924 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15adbb916f32ea68bb00488f65c0b443_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15adbb916f32ea68bb00488f65c0b443_JaffaCakes118.dll,#12⤵PID:3528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3528 -s 6563⤵
- Program crash
PID:3936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3528 -ip 35281⤵PID:3368