Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
3c00d8fef192a21b8d15f3e6f67db97a_JaffaCakes118.dll
Resource
win7-20240508-en
General
-
Target
3c00d8fef192a21b8d15f3e6f67db97a_JaffaCakes118.dll
-
Size
90KB
-
MD5
3c00d8fef192a21b8d15f3e6f67db97a
-
SHA1
4a4bcf369d6f16923d466c8373162bbdac76d16b
-
SHA256
5eaa7f75f100ddcc02faa81c5167d715e932aca379f9a9a083fd2ef3e24b73b1
-
SHA512
095dd70730b95677f2211d0beb7d4430ce2aafcaccfcd24279310cdc57843627bb38d5e3480413c6a5cc629f7780095e18c0399a0a27915c3312f67ec78d3eca
-
SSDEEP
1536:M3Ul6zJXqTbSkvC2G58LqhHuJqH1O95d+GvvV4xT/X5cx:qU0FH5hOJqVO95dO/X
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3056 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 3056 rundll32.exe Token: SeTcbPrivilege 3056 rundll32.exe Token: SeChangeNotifyPrivilege 3056 rundll32.exe Token: SeCreateTokenPrivilege 3056 rundll32.exe Token: SeBackupPrivilege 3056 rundll32.exe Token: SeRestorePrivilege 3056 rundll32.exe Token: SeIncreaseQuotaPrivilege 3056 rundll32.exe Token: SeAssignPrimaryTokenPrivilege 3056 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1684 wrote to memory of 3056 1684 rundll32.exe 28 PID 1684 wrote to memory of 3056 1684 rundll32.exe 28 PID 1684 wrote to memory of 3056 1684 rundll32.exe 28 PID 1684 wrote to memory of 3056 1684 rundll32.exe 28 PID 1684 wrote to memory of 3056 1684 rundll32.exe 28 PID 1684 wrote to memory of 3056 1684 rundll32.exe 28 PID 1684 wrote to memory of 3056 1684 rundll32.exe 28 PID 3056 wrote to memory of 836 3056 rundll32.exe 29 PID 3056 wrote to memory of 836 3056 rundll32.exe 29 PID 3056 wrote to memory of 836 3056 rundll32.exe 29 PID 3056 wrote to memory of 836 3056 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c00d8fef192a21b8d15f3e6f67db97a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c00d8fef192a21b8d15f3e6f67db97a_JaffaCakes118.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\cmd.execmd /K3⤵PID:836
-
-