Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 21:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
008d1bae80f701a90133a44b82c73cbe_JaffaCakes118.dll
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
008d1bae80f701a90133a44b82c73cbe_JaffaCakes118.dll
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
008d1bae80f701a90133a44b82c73cbe_JaffaCakes118.dll
-
Size
38KB
-
MD5
008d1bae80f701a90133a44b82c73cbe
-
SHA1
aa2cd42f21602a5fbc3ca4bbb372a019e1dda872
-
SHA256
aa7f1aa44ec49fb49eac5903db6e599af397c85debf5deecdde89723625050c1
-
SHA512
c755af04043c76225bddaaece0799d6ed68a90f7faef0f233b15e401016151f18b68d7a6cff1401e82edfa41a7d5b1eacaca344eeb499cb7f9282273ba08e364
-
SSDEEP
384:k70paF9yY4ZI7AfcrUiR2Gd5wxVT3HCPRm:ByyFf0UiR2KwxVT3CQ
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2364 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2364 1700 rundll32.exe 28 PID 1700 wrote to memory of 2364 1700 rundll32.exe 28 PID 1700 wrote to memory of 2364 1700 rundll32.exe 28 PID 1700 wrote to memory of 2364 1700 rundll32.exe 28 PID 1700 wrote to memory of 2364 1700 rundll32.exe 28 PID 1700 wrote to memory of 2364 1700 rundll32.exe 28 PID 1700 wrote to memory of 2364 1700 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\008d1bae80f701a90133a44b82c73cbe_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\008d1bae80f701a90133a44b82c73cbe_JaffaCakes118.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:2364
-