Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 02:51
Behavioral task
behavioral1
Sample
022fa1fbfe98da889404b3ee335feece_JaffaCakes118.dll
Resource
win7-20240611-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
022fa1fbfe98da889404b3ee335feece_JaffaCakes118.dll
Resource
win10v2004-20240508-en
6 signatures
150 seconds
General
-
Target
022fa1fbfe98da889404b3ee335feece_JaffaCakes118.dll
-
Size
31KB
-
MD5
022fa1fbfe98da889404b3ee335feece
-
SHA1
31592012dea319ece77bec3ecbddfa4ef0780d96
-
SHA256
60fcb60082d8ab43579ddbd047a242567b9c7188e1433ea0524c30be21a5e13a
-
SHA512
041e412c6489cfce9b1f00789542e620679148824cf6f8830fb07a60672d0fd281c70fc97ebc2f12ea2097be0b49f98eb7abc74c3005067fda4c36e16021a215
-
SSDEEP
768:ofK9GjL+uGOfcECu2f+4HsC25ZscBA/VO9SX1dLd:oCiKunfnAsCmZscBs8Sfx
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1808-0-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rpcc.dll rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1808 rundll32.exe 1808 rundll32.exe 1808 rundll32.exe 1808 rundll32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1808 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1808 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2496 wrote to memory of 1808 2496 rundll32.exe 82 PID 2496 wrote to memory of 1808 2496 rundll32.exe 82 PID 2496 wrote to memory of 1808 2496 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\022fa1fbfe98da889404b3ee335feece_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\022fa1fbfe98da889404b3ee335feece_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1808
-