Analysis
-
max time kernel
94s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 14:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2cbf708297e018e1f557db2fa419e326_JaffaCakes118.dll
Resource
win7-20240704-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2cbf708297e018e1f557db2fa419e326_JaffaCakes118.dll
Resource
win10v2004-20240704-en
2 signatures
150 seconds
General
-
Target
2cbf708297e018e1f557db2fa419e326_JaffaCakes118.dll
-
Size
40KB
-
MD5
2cbf708297e018e1f557db2fa419e326
-
SHA1
04ce57b86ec1e25c9988e221d43a9a10c77aa7bd
-
SHA256
7639c3229137fca5bf6f3c30e31db1754b0f2da6b16fae3e8817bf2fef95e6cc
-
SHA512
52d123f0ea8ba47c347eb684fc8d416ebc3dd4121d36bb045a5738a219565f38da71f1b6c54a4f6b6ca0936fecba0f1ebf59d49e3e030089eca9ef7a94afeaa3
-
SSDEEP
768:7nk3rQnVKzvP0qey8bfmJwlBC1ZfLda3:4bQnEzUPyM8wXC1Zh4
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1012 4688 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 620 wrote to memory of 4688 620 rundll32.exe 82 PID 620 wrote to memory of 4688 620 rundll32.exe 82 PID 620 wrote to memory of 4688 620 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cbf708297e018e1f557db2fa419e326_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cbf708297e018e1f557db2fa419e326_JaffaCakes118.dll,#12⤵PID:4688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 5603⤵
- Program crash
PID:1012
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4688 -ip 46881⤵PID:832