Analysis
-
max time kernel
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 16:53
Behavioral task
behavioral1
Sample
39f9c4646aadcf838d55ae8e2740d4f4_JaffaCakes118.exe
Resource
win7-20240705-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
39f9c4646aadcf838d55ae8e2740d4f4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
6 signatures
150 seconds
Behavioral task
behavioral3
Sample
$TEMP/4HKMbhZs.dll
Resource
win10v2004-20240709-en
3 signatures
150 seconds
General
-
Target
$TEMP/4HKMbhZs.dll
-
Size
71KB
-
MD5
f6df0c1ed00d1c1a3a2976ba832765d6
-
SHA1
315b1a41b0e6328543e6cd31ab114fd144aecdbb
-
SHA256
b38ba468cb301b7cb3db3262ebdbfc045c485a0bb2947d59461cba198900f24e
-
SHA512
7850224f293943a0476e2d8ce3082f93881dbbc107d482ec655ea5f1b4f73b208361fe7422e2b99c7980bc6774ead4813e43eb3e1e0cd34868817a993cab5d75
-
SSDEEP
1536:G/zuOVTaPTGxn4zthmkKSQV51IpX+G2xyEdZB6NLg/8:qusYKn+/mktU1RH7R/8
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral3/memory/1852-0-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4824 1852 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1852 1276 rundll32.exe 83 PID 1276 wrote to memory of 1852 1276 rundll32.exe 83 PID 1276 wrote to memory of 1852 1276 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\4HKMbhZs.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\4HKMbhZs.dll,#12⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 5763⤵
- Program crash
PID:4824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1852 -ip 18521⤵PID:4968