Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 12:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1b3eb05406db7d5501cc5726e27a8db1_JaffaCakes118.exe
Resource
win7-20240508-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1b3eb05406db7d5501cc5726e27a8db1_JaffaCakes118.exe
Resource
win10v2004-20240611-en
1 signatures
150 seconds
General
-
Target
1b3eb05406db7d5501cc5726e27a8db1_JaffaCakes118.exe
-
Size
151KB
-
MD5
1b3eb05406db7d5501cc5726e27a8db1
-
SHA1
9b77346ef2a27cea1e3bc15d2703c5a338dc2558
-
SHA256
d97bf0f2047d5281fbc8b105f32b3941b02224e6b03386de3892f1108aa86bab
-
SHA512
ebadf6cfef43beabc94aa332c23fb5136592720c61493326ab0716e31381a3cb28087f1ed063db10404f7d53c6498239a6f692849956bcf7c972d38b9e63d994
-
SSDEEP
3072:QykVD1BSqao9c3HwsanTdgyOxsP+f+Ef6yXwL6VRk87e:iSqjc3HsTaxoqv7a6VH
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1816 2060 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1816 2060 1b3eb05406db7d5501cc5726e27a8db1_JaffaCakes118.exe 28 PID 2060 wrote to memory of 1816 2060 1b3eb05406db7d5501cc5726e27a8db1_JaffaCakes118.exe 28 PID 2060 wrote to memory of 1816 2060 1b3eb05406db7d5501cc5726e27a8db1_JaffaCakes118.exe 28 PID 2060 wrote to memory of 1816 2060 1b3eb05406db7d5501cc5726e27a8db1_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b3eb05406db7d5501cc5726e27a8db1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1b3eb05406db7d5501cc5726e27a8db1_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 922⤵
- Program crash
PID:1816
-