Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 18:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e8299f1e08b4af37de4722c9c944447d_JaffaCakes118.dll
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
e8299f1e08b4af37de4722c9c944447d_JaffaCakes118.dll
Resource
win10v2004-20240319-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
e8299f1e08b4af37de4722c9c944447d_JaffaCakes118.dll
-
Size
164KB
-
MD5
e8299f1e08b4af37de4722c9c944447d
-
SHA1
4438562a4ec26bdb561a017710bee8e49a8b7b2e
-
SHA256
6cccac06737c66607cda5c1ad13844bcb84095dabfcfa9eca9bb2e2201db4bb2
-
SHA512
82e7ead04e1030a57bda7bf18a9b442fe9a09b114bb9d3b98897a5dacd8f8cd4a638f561c59fc420b8a4ee0317201aa005ee393eac41e3a853c6b50c6116094c
-
SSDEEP
3072:VY4Nltz05irnga9U4Qoc0CP7S3LIN10OvTVMVZXE5mqx1nCUJMkLI2Q1:VYqltucga+DSbG10OvTuVZ0U0Ukb
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = ",rundll32.exe C:\\Windows\\system32\\070320.dll start" rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3848 4012 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4012 rundll32.exe 4012 rundll32.exe 4012 rundll32.exe 4012 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4012 rundll32.exe Token: SeDebugPrivilege 4012 rundll32.exe Token: SeDebugPrivilege 4012 rundll32.exe Token: SeDebugPrivilege 4012 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4752 wrote to memory of 4012 4752 rundll32.exe 95 PID 4752 wrote to memory of 4012 4752 rundll32.exe 95 PID 4752 wrote to memory of 4012 4752 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e8299f1e08b4af37de4722c9c944447d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e8299f1e08b4af37de4722c9c944447d_JaffaCakes118.dll,#12⤵
- Modifies WinLogon for persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 9323⤵
- Program crash
PID:3848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4012 -ip 40121⤵PID:3412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3808 --field-trial-handle=2228,i,8155065313278028490,17854605419281052753,262144 --variations-seed-version /prefetch:81⤵PID:4148