Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 02:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2aa228dc5365a5ba1e4305841ea51742_JaffaCakes118.exe
Resource
win7-20240220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2aa228dc5365a5ba1e4305841ea51742_JaffaCakes118.exe
Resource
win10v2004-20240704-en
1 signatures
150 seconds
General
-
Target
2aa228dc5365a5ba1e4305841ea51742_JaffaCakes118.exe
-
Size
96KB
-
MD5
2aa228dc5365a5ba1e4305841ea51742
-
SHA1
f63f30b7e3c2afb570f5bfa73da401356ad4e0ee
-
SHA256
588b8073fe51e3303ba2d6b9b3cd30d2f78a623faf34210d476267cbe4920653
-
SHA512
981a9bb522f1e43b9029d4d9933cbc82e98820a33c2d9b67c38f727268fd0c5b99a1cd0cdaf0fa7ddf2a06188dd962e56f9f3d0fdfaa6eb3486cc021966e5eba
-
SSDEEP
1536:PJorGlCY/jGavh2ZqUMnd8EYnZhLxslMPHqybj7W7drClO7:PJmYaY2kUK8FbL97W7W
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process 1800 2080 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1800 2080 2aa228dc5365a5ba1e4305841ea51742_JaffaCakes118.exe 28 PID 2080 wrote to memory of 1800 2080 2aa228dc5365a5ba1e4305841ea51742_JaffaCakes118.exe 28 PID 2080 wrote to memory of 1800 2080 2aa228dc5365a5ba1e4305841ea51742_JaffaCakes118.exe 28 PID 2080 wrote to memory of 1800 2080 2aa228dc5365a5ba1e4305841ea51742_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aa228dc5365a5ba1e4305841ea51742_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2aa228dc5365a5ba1e4305841ea51742_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 882⤵
- Program crash
PID:1800
-