Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 07:05
Static task
static1
Behavioral task
behavioral1
Sample
1688213bc5f70643deab5bdb02c0ae6c_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
1688213bc5f70643deab5bdb02c0ae6c_JaffaCakes118.dll
-
Size
570KB
-
MD5
1688213bc5f70643deab5bdb02c0ae6c
-
SHA1
b126be6cbc4543a57474a97bf8d4c439de56b4c2
-
SHA256
3aa6735651a8c21a6beff73d8c0a8ed8e7f5e62165a9f44e85cdedd063464252
-
SHA512
46798f5350024a6b8ca8303bc6c1cdd97ae13056ea722dd41bf72aaed9bdd627c024669ee4ba5bdc91efb0840965c86b929835f1acb64094705137c1a1cb9c6f
-
SSDEEP
6144:pXhlbaTbLY6VhaQOJz3utQd24SQ5J5HvoNQ/JyRpYrC:pXh5a7BV83utQd24JvorRpY
Malware Config
Extracted
zloader
bat1k2
bat1k2
http://as9897234135.xyz/LKhwojehDgwegSDG/gateJKjdsh.php
http://as9897234135.org/LKhwojehDgwegSDG/gateJKjdsh.php
http://as9897234135.net/LKhwojehDgwegSDG/gateJKjdsh.php
http://as9897234135.in/LKhwojehDgwegSDG/gateJKjdsh.php
http://as9897234135.com/LKhwojehDgwegSDG/gateJKjdsh.php
-
build_id
36
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2352 created 1204 2352 rundll32.exe 21 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2352 set thread context of 2152 2352 rundll32.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2352 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2352 rundll32.exe Token: SeSecurityPrivilege 2152 msiexec.exe Token: SeSecurityPrivilege 2152 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2352 2336 rundll32.exe 28 PID 2336 wrote to memory of 2352 2336 rundll32.exe 28 PID 2336 wrote to memory of 2352 2336 rundll32.exe 28 PID 2336 wrote to memory of 2352 2336 rundll32.exe 28 PID 2336 wrote to memory of 2352 2336 rundll32.exe 28 PID 2336 wrote to memory of 2352 2336 rundll32.exe 28 PID 2336 wrote to memory of 2352 2336 rundll32.exe 28 PID 2352 wrote to memory of 2152 2352 rundll32.exe 29 PID 2352 wrote to memory of 2152 2352 rundll32.exe 29 PID 2352 wrote to memory of 2152 2352 rundll32.exe 29 PID 2352 wrote to memory of 2152 2352 rundll32.exe 29 PID 2352 wrote to memory of 2152 2352 rundll32.exe 29 PID 2352 wrote to memory of 2152 2352 rundll32.exe 29 PID 2352 wrote to memory of 2152 2352 rundll32.exe 29 PID 2352 wrote to memory of 2152 2352 rundll32.exe 29 PID 2352 wrote to memory of 2152 2352 rundll32.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1688213bc5f70643deab5bdb02c0ae6c_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1688213bc5f70643deab5bdb02c0ae6c_JaffaCakes118.dll,#13⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2152
-