Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 11:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6752e1138658fe51356fe4e8ee8c196c_JaffaCakes118.dll
Resource
win7-20240704-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
6752e1138658fe51356fe4e8ee8c196c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
6752e1138658fe51356fe4e8ee8c196c_JaffaCakes118.dll
-
Size
300KB
-
MD5
6752e1138658fe51356fe4e8ee8c196c
-
SHA1
4a06610860fc03158df11cba589dd1b8e3c05764
-
SHA256
e7fba74a5be6cc481bad0dd6e04cb86089e964bac693ae99cdebf8c320639ca4
-
SHA512
85cc048dd61472a429db721785a0b5faee075c91bf6be9601be7b5349e0e06896d63992dc55281241635f7253ea04d27190d432dfbf1999fa789da636ba95512
-
SSDEEP
6144:FKGntbwk5H7vK0PvKSBVFzl8zkIBglztaqg:Yctbwk5bSQV5l8zkIuzwb
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1452 2888 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2888 3064 rundll32.exe 84 PID 3064 wrote to memory of 2888 3064 rundll32.exe 84 PID 3064 wrote to memory of 2888 3064 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6752e1138658fe51356fe4e8ee8c196c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6752e1138658fe51356fe4e8ee8c196c_JaffaCakes118.dll,#12⤵PID:2888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 6243⤵
- Program crash
PID:1452
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2888 -ip 28881⤵PID:4760