Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 00:00

General

  • Target

    04d721749f2ee7c9dc6ff428cee3dd31_JaffaCakes118.dll

  • Size

    59KB

  • MD5

    04d721749f2ee7c9dc6ff428cee3dd31

  • SHA1

    5dd5f3c88765ea3f7a5fe9be75b791cb61b94d23

  • SHA256

    93e69e9c86d362f985bd924b74431689f1e47f2a4e53c2cfce752610249aaf5e

  • SHA512

    93510681094c44e6d7a1aff0c72d15fd174318b64ee57a499898525305a0b43e611fa54138ea4eb31144edc02bf8ea12733db7521abbca988b2fee99dfdd417f

  • SSDEEP

    1536:BZU5JDD3k69pB3c67glRIMwI9AfZ31CYTQg0WGW4Y:BZk0ipBM67NMTSC11ze

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 2 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\04d721749f2ee7c9dc6ff428cee3dd31_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\04d721749f2ee7c9dc6ff428cee3dd31_JaffaCakes118.dll,#1
      2⤵
      • Sets service image path in registry
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:2060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2060-2-0x0000000045324000-0x0000000045326000-memory.dmp

    Filesize

    8KB