Analysis
-
max time kernel
139s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 21:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
616312b3377f5f14bda96715c8faef49_JaffaCakes118.dll
Resource
win7-20240708-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
616312b3377f5f14bda96715c8faef49_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
616312b3377f5f14bda96715c8faef49_JaffaCakes118.dll
-
Size
273KB
-
MD5
616312b3377f5f14bda96715c8faef49
-
SHA1
575da055f24f834c4e1ff6978914dcdcd7211748
-
SHA256
e0fef6e9e2fb9610a1e32780f24420d17e6f4f39de27557a319ef5df90a5bbe5
-
SHA512
56799b6df181a8653721c6a75d173b793813d884c6dc72c5c845e8d65a0f9d895e126bc8bd8df2492856b5bcd1f00e97b7d07eec04de7d3e1bdd2a67a193549e
-
SSDEEP
6144:sk813XD+nz/G3PiaAKd1HfxmF6ZvPynWmo7XSsZ5V:/kR3yAMGikSG
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3640 208 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4480 wrote to memory of 208 4480 rundll32.exe 84 PID 4480 wrote to memory of 208 4480 rundll32.exe 84 PID 4480 wrote to memory of 208 4480 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\616312b3377f5f14bda96715c8faef49_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\616312b3377f5f14bda96715c8faef49_JaffaCakes118.dll,#12⤵PID:208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 5443⤵
- Program crash
PID:3640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 208 -ip 2081⤵PID:3096