Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 03:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4cabcc376663a238acb5782b31f4db8e_JaffaCakes118.dll
Resource
win7-20240704-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
4cabcc376663a238acb5782b31f4db8e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
4cabcc376663a238acb5782b31f4db8e_JaffaCakes118.dll
-
Size
809KB
-
MD5
4cabcc376663a238acb5782b31f4db8e
-
SHA1
5df0136fff34a6372fe1cd1c4d217cb70c2b702b
-
SHA256
5341fb9edc1a2b88b0c735485661ce795acf459322afbf64e8fecbc74ce99971
-
SHA512
a63e743ffcd12cf8f613423f9c525c5399c10aeec9b3566c29068abefebece916a317f5061b08ef31e6e01acdd21a883b598baa5a65f462340354c9a1d08056c
-
SSDEEP
24576:gCecquYVVUqJU/G/fjhwWgjCf+kTlGMKu:NWVtZnVwHkJGZu
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 384 892 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 220 wrote to memory of 892 220 rundll32.exe 83 PID 220 wrote to memory of 892 220 rundll32.exe 83 PID 220 wrote to memory of 892 220 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4cabcc376663a238acb5782b31f4db8e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4cabcc376663a238acb5782b31f4db8e_JaffaCakes118.dll,#12⤵PID:892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 6083⤵
- Program crash
PID:384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 892 -ip 8921⤵PID:2056