Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
05006e279067c1ddb6cccb9574d1ed46_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05006e279067c1ddb6cccb9574d1ed46_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
05006e279067c1ddb6cccb9574d1ed46_JaffaCakes118.dll
-
Size
6KB
-
MD5
05006e279067c1ddb6cccb9574d1ed46
-
SHA1
064013807c60e12652763a90a99ab1b8dc5812a4
-
SHA256
279a387356147513571df3f02e21f2462e0dd1186a156bd57a2936e827569038
-
SHA512
573f1f168fdba10b1bcf6b8d5408844553b0984a91f48d2e5241223f88826da5438cc1476d2dcc443e735b369cdb89c72ff36ff32e633421f509998d2724f603
-
SSDEEP
96:Z9vjzuiXijMmGHQqvkykX1wbHHYXtj+p6fXeFr457d82bHxFovB:LtmGHHmwbH49jtvcrypHC
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4728 wrote to memory of 1832 4728 rundll32.exe 89 PID 4728 wrote to memory of 1832 4728 rundll32.exe 89 PID 4728 wrote to memory of 1832 4728 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05006e279067c1ddb6cccb9574d1ed46_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05006e279067c1ddb6cccb9574d1ed46_JaffaCakes118.dll,#12⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1304,i,6593821857742176458,13646536021844995125,262144 --variations-seed-version --mojo-platform-channel-handle=4020 /prefetch:81⤵PID:2152