Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 07:51
Behavioral task
behavioral1
Sample
625f3c5e293f83a6d7f946bc0a34e84f_JaffaCakes118.exe
Resource
win7-20240705-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
625f3c5e293f83a6d7f946bc0a34e84f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
625f3c5e293f83a6d7f946bc0a34e84f_JaffaCakes118.exe
-
Size
32KB
-
MD5
625f3c5e293f83a6d7f946bc0a34e84f
-
SHA1
be1c5607e2a3bc544721e7f1a1eca04127650692
-
SHA256
317cd233a699b6e61e1bbeb1edeea6240285984a695d052760db0fc5db7cac3b
-
SHA512
ca21d5694f0640ede5381b8e0e8ecd87438fd6db0481dcc28ae737e759fd9c8aff8f68378dd4143c718b8e50a3194b5bcc8c93441177af8e81c0b80da9c6491a
-
SSDEEP
384:sOicucD8i1mzM3TQYkQmeZOzH5f+qc0XdrF9vM79:NdV1YM3JHkTd5q79
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1656-0-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Eventlog.dll 625f3c5e293f83a6d7f946bc0a34e84f_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2168 1656 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2168 1656 625f3c5e293f83a6d7f946bc0a34e84f_JaffaCakes118.exe 30 PID 1656 wrote to memory of 2168 1656 625f3c5e293f83a6d7f946bc0a34e84f_JaffaCakes118.exe 30 PID 1656 wrote to memory of 2168 1656 625f3c5e293f83a6d7f946bc0a34e84f_JaffaCakes118.exe 30 PID 1656 wrote to memory of 2168 1656 625f3c5e293f83a6d7f946bc0a34e84f_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\625f3c5e293f83a6d7f946bc0a34e84f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\625f3c5e293f83a6d7f946bc0a34e84f_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 442⤵
- Program crash
PID:2168
-