Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 14:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
637bf43de02426127b105f7e49a7f05e_JaffaCakes118.dll
Resource
win7-20240708-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
637bf43de02426127b105f7e49a7f05e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
637bf43de02426127b105f7e49a7f05e_JaffaCakes118.dll
-
Size
9KB
-
MD5
637bf43de02426127b105f7e49a7f05e
-
SHA1
d5070885b0b368ce7b7ba255428d0706ae0cb49f
-
SHA256
8803c4a7f3c72a73a536594ca0d242b2cdfa56b20896bb84d3e249985e3331f2
-
SHA512
728800fc5cbecbfefcff4ee4868b3094db4738165942c71ee2f76b0ce1e8942804495cd2f29064f8ac34f5b737b6a3d8970160497b0c3f8d3ae35c8a73ae38c9
-
SSDEEP
96:q1V7dR7uwEU+hCT3GrxZ4MUtPNlz0MdG8EWvdM3IWwG34b:kuwEt8rsTUtPLzKNWSYWF4b
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3336 1032 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 216 wrote to memory of 1032 216 rundll32.exe 84 PID 216 wrote to memory of 1032 216 rundll32.exe 84 PID 216 wrote to memory of 1032 216 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\637bf43de02426127b105f7e49a7f05e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\637bf43de02426127b105f7e49a7f05e_JaffaCakes118.dll,#12⤵PID:1032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 6243⤵
- Program crash
PID:3336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1032 -ip 10321⤵PID:2076