Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 06:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
408c4ba9f5e92f6bd4769ec586dfd624_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
408c4ba9f5e92f6bd4769ec586dfd624_JaffaCakes118.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
408c4ba9f5e92f6bd4769ec586dfd624_JaffaCakes118.dll
-
Size
103KB
-
MD5
408c4ba9f5e92f6bd4769ec586dfd624
-
SHA1
895591b2a068b0e2c121fed0ff66dcb92c16f9e5
-
SHA256
05c0b1235f9fe5c1ebf99fa695c1efaefbe87b08552e52034d1dca1d068cd6fa
-
SHA512
e3d1462542d15cc662e4ae711001aeca8ccc9b47b3180548cc462d6767f87c86d4c431227c89d43312409481d4f32dfae297a664f1d8da519c9e57d922c3883d
-
SSDEEP
3072:URP1SzbAM6rXlazEAspJuukKOpYFq6uqI:0+bAM6r6ipJuukK95/
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2168 3004 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3000 wrote to memory of 3004 3000 rundll32.exe 30 PID 3000 wrote to memory of 3004 3000 rundll32.exe 30 PID 3000 wrote to memory of 3004 3000 rundll32.exe 30 PID 3000 wrote to memory of 3004 3000 rundll32.exe 30 PID 3000 wrote to memory of 3004 3000 rundll32.exe 30 PID 3000 wrote to memory of 3004 3000 rundll32.exe 30 PID 3000 wrote to memory of 3004 3000 rundll32.exe 30 PID 3004 wrote to memory of 2168 3004 rundll32.exe 31 PID 3004 wrote to memory of 2168 3004 rundll32.exe 31 PID 3004 wrote to memory of 2168 3004 rundll32.exe 31 PID 3004 wrote to memory of 2168 3004 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\408c4ba9f5e92f6bd4769ec586dfd624_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\408c4ba9f5e92f6bd4769ec586dfd624_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 2243⤵
- Program crash
PID:2168
-
-