Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-03-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
327bc03c1821cc7673ff48bc47d93368_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
327bc03c1821cc7673ff48bc47d93368_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
327bc03c1821cc7673ff48bc47d93368_JaffaCakes118.dll
-
Size
827KB
-
MD5
327bc03c1821cc7673ff48bc47d93368
-
SHA1
af4255deb60eda4e4fdab5a958f10961bd86fc84
-
SHA256
bfefa83dfe710110cb2d878ba64ceb037a7e55e612bafe87336873f56623aead
-
SHA512
9ddf45a4a69595e300e81ca5a40ce4e379b69eb81a7ce3312a57cd9aa26e61a0d5ba30c2c91a868aea6807760e9939027bb6630ac9a7f4b343ddfda2a156642d
-
SSDEEP
24576:j+gecwDSOyMLU5y0IrDU/KOPSZFaxmXVhBgnKgzO:jx77MQ5yCTxJKaO
Malware Config
Extracted
metasploit
windows/download_exec
http://senocele.com:443/components/profile.gif
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2192 wrote to memory of 2076 2192 rundll32.exe rundll32.exe PID 2192 wrote to memory of 2076 2192 rundll32.exe rundll32.exe PID 2192 wrote to memory of 2076 2192 rundll32.exe rundll32.exe PID 2192 wrote to memory of 2076 2192 rundll32.exe rundll32.exe PID 2192 wrote to memory of 2076 2192 rundll32.exe rundll32.exe PID 2192 wrote to memory of 2076 2192 rundll32.exe rundll32.exe PID 2192 wrote to memory of 2076 2192 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\327bc03c1821cc7673ff48bc47d93368_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\327bc03c1821cc7673ff48bc47d93368_JaffaCakes118.dll,#12⤵PID:2076
-