Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 18:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4aed92b8683e718f86090639f1eb3c94_JaffaCakes118.dll
Resource
win7-20240704-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
4aed92b8683e718f86090639f1eb3c94_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
4aed92b8683e718f86090639f1eb3c94_JaffaCakes118.dll
-
Size
76KB
-
MD5
4aed92b8683e718f86090639f1eb3c94
-
SHA1
7dedd7e683817f038d2a2a23f4eb73be38b3e846
-
SHA256
8037ce4ce6264de8755c47a6f091312d66c67d78b5f14a6eebcf200ad777b0c1
-
SHA512
850a584b3d00d31b756131eb6b9bcb8d6040a3076e0547970ea6b20eafca6725dbe09e5a501ea9c1818a05ce54cbeeecae7986e6ef236a22127e95f6803e0417
-
SSDEEP
1536:MrMIvDvBf2srWz5kE27RWn8hpZnGtU/gZgRIj0X:KQM8F2c87/gZgRIj4
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2788 3928 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4920 wrote to memory of 3928 4920 rundll32.exe 83 PID 4920 wrote to memory of 3928 4920 rundll32.exe 83 PID 4920 wrote to memory of 3928 4920 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4aed92b8683e718f86090639f1eb3c94_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4aed92b8683e718f86090639f1eb3c94_JaffaCakes118.dll,#12⤵PID:3928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 6203⤵
- Program crash
PID:2788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3928 -ip 39281⤵PID:2444