Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 20:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4b5b958a6e9eaafdb674757f72076356_JaffaCakes118.dll
Resource
win7-20240704-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
4b5b958a6e9eaafdb674757f72076356_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
4b5b958a6e9eaafdb674757f72076356_JaffaCakes118.dll
-
Size
115KB
-
MD5
4b5b958a6e9eaafdb674757f72076356
-
SHA1
e002edf86517ff566b636006db23038aa3055f2a
-
SHA256
5e80a7cbc1f9c1f7de058cd2a82e6094eb32a9f5ec2e24b5ec3af3bcbfc974f3
-
SHA512
aa957758e66f5e1eb795286514ce9c4bd370496fdde319981566bda7e96f0d2441b3810e6825433cd0ae096184dc81c511fb1a2ffeec6b931f563bd4eda4756b
-
SSDEEP
3072:Y79z35gQGjjZOD/KQGFNF3Nq6wK3UCfdg6e:CV35gPj+KQGx3UxK37y6
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2684 2864 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2864 2324 rundll32.exe 30 PID 2324 wrote to memory of 2864 2324 rundll32.exe 30 PID 2324 wrote to memory of 2864 2324 rundll32.exe 30 PID 2324 wrote to memory of 2864 2324 rundll32.exe 30 PID 2324 wrote to memory of 2864 2324 rundll32.exe 30 PID 2324 wrote to memory of 2864 2324 rundll32.exe 30 PID 2324 wrote to memory of 2864 2324 rundll32.exe 30 PID 2864 wrote to memory of 2684 2864 rundll32.exe 31 PID 2864 wrote to memory of 2684 2864 rundll32.exe 31 PID 2864 wrote to memory of 2684 2864 rundll32.exe 31 PID 2864 wrote to memory of 2684 2864 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b5b958a6e9eaafdb674757f72076356_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b5b958a6e9eaafdb674757f72076356_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 2283⤵
- Program crash
PID:2684
-
-