Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 03:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2ece7edb99627117647296b384aab086_JaffaCakes118.dll
Resource
win7-20240705-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2ece7edb99627117647296b384aab086_JaffaCakes118.dll
Resource
win10v2004-20240704-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2ece7edb99627117647296b384aab086_JaffaCakes118.dll
-
Size
169KB
-
MD5
2ece7edb99627117647296b384aab086
-
SHA1
6cc1dc54a1ffa9280b8e10e7a9cccbc7630f9531
-
SHA256
339471ded49fa4a74f9ea2a2b817f263fa844303ba34d341154caa11908e291a
-
SHA512
4115898fbd78a530ccb403939beef789d4cb322e6ebe1490617f77a6b850ce36ade3134d413aad893edcaedd6f1e06a9879b5ca743264994c8a21e0dcc0ec30a
-
SSDEEP
3072:vuhE6zRkswBGwRA72tVDtv7gPFB0rjmqyVDmJFd+cYqMTrLS7:vuhLwB+72tptvUv0rKqyJ5xG7
Score
3/10
Malware Config
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 3684 4356 WerFault.exe 82 2040 4356 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 672 wrote to memory of 4356 672 rundll32.exe 82 PID 672 wrote to memory of 4356 672 rundll32.exe 82 PID 672 wrote to memory of 4356 672 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ece7edb99627117647296b384aab086_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ece7edb99627117647296b384aab086_JaffaCakes118.dll,#12⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4356 -s 5603⤵
- Program crash
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4356 -s 8443⤵
- Program crash
PID:2040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4356 -ip 43561⤵PID:1600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4356 -ip 43561⤵PID:888