Analysis
-
max time kernel
95s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 22:33
Behavioral task
behavioral1
Sample
323e35eca24df1bc8521f17257665811_JaffaCakes118.dll
Resource
win7-20240705-en
4 signatures
150 seconds
General
-
Target
323e35eca24df1bc8521f17257665811_JaffaCakes118.dll
-
Size
114KB
-
MD5
323e35eca24df1bc8521f17257665811
-
SHA1
150c78d25becdf9a8f042dc04ad4d13e6e26d8ab
-
SHA256
e5268f2e83ec7f75e89f657e8777197ddfea9243167b263e3c0082e05ee9c3c9
-
SHA512
879b39f695a6e432c98ed0d93666f9d90292bfc59b1c2734a3d219519d937c5adc27a6848e737cf110813df1a5829b6a8398f5da6a29ad3e7680a7cdb88657e3
-
SSDEEP
3072:mfvjxULMvPK8ZHPp8zuJwjEei7/KLz0/Ph7U2:ivjxgMvPTZsh7iDK0/pR
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/3232-0-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat behavioral2/memory/3232-1-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat -
Program crash 1 IoCs
pid pid_target Process procid_target 1396 3232 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1388 wrote to memory of 3232 1388 rundll32.exe 82 PID 1388 wrote to memory of 3232 1388 rundll32.exe 82 PID 1388 wrote to memory of 3232 1388 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\323e35eca24df1bc8521f17257665811_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\323e35eca24df1bc8521f17257665811_JaffaCakes118.dll,#12⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 6403⤵
- Program crash
PID:1396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3232 -ip 32321⤵PID:3836