Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 04:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3c04ab3dcfa1bf2ce92246b2115ba355_JaffaCakes118.dll
Resource
win7-20240708-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
3c04ab3dcfa1bf2ce92246b2115ba355_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
3c04ab3dcfa1bf2ce92246b2115ba355_JaffaCakes118.dll
-
Size
172KB
-
MD5
3c04ab3dcfa1bf2ce92246b2115ba355
-
SHA1
fd21fa1ba0f5bca0ba990ce1e63196bc23a7b232
-
SHA256
1b780ddb9bc55fc690c0a90136d67dbd46d4d75344483686730195c150cc7fc4
-
SHA512
4548ee2b0267291fa0896e1483536dc408377d5abf4e9aad475b890b9c7c405fce4ea01a171332e50810617e1580aed83b95e5d3d6ac20ace71153f23a8b5e7f
-
SSDEEP
3072:03Ne5Rah/8hNrXeVN4TCrVHAQEyj9hjzY4INqOFh+tROGs7g:UA+hkhNrG4TCB+4hjzfsqOFyRhf
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3948 4976 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2116 wrote to memory of 4976 2116 rundll32.exe 83 PID 2116 wrote to memory of 4976 2116 rundll32.exe 83 PID 2116 wrote to memory of 4976 2116 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c04ab3dcfa1bf2ce92246b2115ba355_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c04ab3dcfa1bf2ce92246b2115ba355_JaffaCakes118.dll,#12⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 5603⤵
- Program crash
PID:3948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4976 -ip 49761⤵PID:3564