Analysis
-
max time kernel
23s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 16:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
63fe4eb72749f4ffe77eab0d79bd4ee7_JaffaCakes118.exe
Resource
win7-20240704-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
63fe4eb72749f4ffe77eab0d79bd4ee7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
63fe4eb72749f4ffe77eab0d79bd4ee7_JaffaCakes118.exe
-
Size
120KB
-
MD5
63fe4eb72749f4ffe77eab0d79bd4ee7
-
SHA1
dab1f7653c291cde4c3b65faad4cff7122a57b88
-
SHA256
2a50a2f06ff6447d86c9105b582c28f16fdc4ea745d89bc768906702ef21d7be
-
SHA512
2e8d8f5c5a10c27ab0405a87066493c8ec2042251dcaae784710465330efe79ab09120d69eb519c7ade9a2147ad3612a634c1c8c3e39056748f5b30160044d01
-
SSDEEP
1536:KeuHWgzcP/H5uHRQq0IG80MRWvfKEk184wtvCsOKYSP/cAXLP0a4gI6Pkzi9wN4L:r2cPwxQq4FXpTVLtL0a4g9OIwSaA1lWI
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2040 2800 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2040 2800 63fe4eb72749f4ffe77eab0d79bd4ee7_JaffaCakes118.exe 30 PID 2800 wrote to memory of 2040 2800 63fe4eb72749f4ffe77eab0d79bd4ee7_JaffaCakes118.exe 30 PID 2800 wrote to memory of 2040 2800 63fe4eb72749f4ffe77eab0d79bd4ee7_JaffaCakes118.exe 30 PID 2800 wrote to memory of 2040 2800 63fe4eb72749f4ffe77eab0d79bd4ee7_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\63fe4eb72749f4ffe77eab0d79bd4ee7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\63fe4eb72749f4ffe77eab0d79bd4ee7_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 362⤵
- Program crash
PID:2040
-