Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 12:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
60828cd0fa4ef1e9fd07f187da8a52e9_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
60828cd0fa4ef1e9fd07f187da8a52e9_JaffaCakes118.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
60828cd0fa4ef1e9fd07f187da8a52e9_JaffaCakes118.dll
-
Size
123KB
-
MD5
60828cd0fa4ef1e9fd07f187da8a52e9
-
SHA1
785e27f88e995e543f4296339a86863e477ca932
-
SHA256
249c7496bf80d4f5f30d188f2e48841af068183e1bd747ff80066da41523a3c2
-
SHA512
dba38470d15e840fd9dbc9a686e423b36d4483ea806480f19f9f4715f56b18768f2bcbca34cc46c8159e20989b8e3edf23cf263723499bfd527c9ed388128c42
-
SSDEEP
1536:mkxIlEyi+AK4k+IhXcu9dWjqAssZIXbZCet:K6A4k9hXCjJssZIX9
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4448 3656 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3100 wrote to memory of 3656 3100 rundll32.exe 86 PID 3100 wrote to memory of 3656 3100 rundll32.exe 86 PID 3100 wrote to memory of 3656 3100 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60828cd0fa4ef1e9fd07f187da8a52e9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60828cd0fa4ef1e9fd07f187da8a52e9_JaffaCakes118.dll,#12⤵PID:3656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 5483⤵
- Program crash
PID:4448
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3656 -ip 36561⤵PID:4348