Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 19:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2d974ebe73199e78a2a2e0f786c89263_JaffaCakes118.dll
Resource
win7-20240704-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2d974ebe73199e78a2a2e0f786c89263_JaffaCakes118.dll
Resource
win10v2004-20240704-en
2 signatures
150 seconds
General
-
Target
2d974ebe73199e78a2a2e0f786c89263_JaffaCakes118.dll
-
Size
30KB
-
MD5
2d974ebe73199e78a2a2e0f786c89263
-
SHA1
5402fe964d06b3ad0cdbee7887705c9be02e76a0
-
SHA256
d5ddac425c347f973e7011aae77e122aa37d9f939ff33a5176279e5e5f8d9ece
-
SHA512
d4a016848877fa1f4357f7738566b2be3ee19577f077b5c19b65d7ac80868e83b7673f0741b26ebfa24a82235e3a84892ef165780cabee5628000be212ebc988
-
SSDEEP
768:WxGPg7jFn3qpMaL7jxD4ltFPnAvpNEqqQtnaCIlp:Wkg7jF3qPPjxD4VPAvpNEqq+Jk
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2244 4380 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4864 wrote to memory of 4380 4864 rundll32.exe 82 PID 4864 wrote to memory of 4380 4864 rundll32.exe 82 PID 4864 wrote to memory of 4380 4864 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d974ebe73199e78a2a2e0f786c89263_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d974ebe73199e78a2a2e0f786c89263_JaffaCakes118.dll,#12⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 5603⤵
- Program crash
PID:2244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4380 -ip 43801⤵PID:1728