Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 09:00
Static task
static1
Behavioral task
behavioral1
Sample
04880fd0b2663d31f63141ad83948d11_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
04880fd0b2663d31f63141ad83948d11_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
04880fd0b2663d31f63141ad83948d11_JaffaCakes118.dll
-
Size
14KB
-
MD5
04880fd0b2663d31f63141ad83948d11
-
SHA1
64c535757dc7d41cd82710e4202f0ac9e17412cd
-
SHA256
378d720ecbe3e27ae283257f0e15bebbfabab4610c929a91a1b19226d3e787e5
-
SHA512
cc5e1f252222965180c6347107b665430a448de122d0934f5a512fa1ab90d56720669ab7a0ee6ad1481f239815512bb0d02377556a527c9df0e0819cfed9a22a
-
SSDEEP
384:d94Q5CpkV+svcYEe5JJblqdOI3H+eQwxZ6//WiP9LmSB+cllklN:d9HCRybEKlgOIOdwvm/W0xAN
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\mseion.sys rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1816 rundll32.exe 1816 rundll32.exe 1816 rundll32.exe 1816 rundll32.exe 1816 rundll32.exe 1816 rundll32.exe 1816 rundll32.exe 1816 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1816 rundll32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1816 2128 rundll32.exe 28 PID 2128 wrote to memory of 1816 2128 rundll32.exe 28 PID 2128 wrote to memory of 1816 2128 rundll32.exe 28 PID 2128 wrote to memory of 1816 2128 rundll32.exe 28 PID 2128 wrote to memory of 1816 2128 rundll32.exe 28 PID 2128 wrote to memory of 1816 2128 rundll32.exe 28 PID 2128 wrote to memory of 1816 2128 rundll32.exe 28 PID 1816 wrote to memory of 1184 1816 rundll32.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04880fd0b2663d31f63141ad83948d11_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04880fd0b2663d31f63141ad83948d11_JaffaCakes118.dll,#13⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816
-
-