Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 00:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
04d721749f2ee7c9dc6ff428cee3dd31_JaffaCakes118.dll
Resource
win7-20240611-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
04d721749f2ee7c9dc6ff428cee3dd31_JaffaCakes118.dll
Resource
win10v2004-20240508-en
4 signatures
150 seconds
General
-
Target
04d721749f2ee7c9dc6ff428cee3dd31_JaffaCakes118.dll
-
Size
59KB
-
MD5
04d721749f2ee7c9dc6ff428cee3dd31
-
SHA1
5dd5f3c88765ea3f7a5fe9be75b791cb61b94d23
-
SHA256
93e69e9c86d362f985bd924b74431689f1e47f2a4e53c2cfce752610249aaf5e
-
SHA512
93510681094c44e6d7a1aff0c72d15fd174318b64ee57a499898525305a0b43e611fa54138ea4eb31144edc02bf8ea12733db7521abbca988b2fee99dfdd417f
-
SSDEEP
1536:BZU5JDD3k69pB3c67glRIMwI9AfZ31CYTQg0WGW4Y:BZk0ipBM67NMTSC11ze
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\{79007602-0CDB-4405-9DBF-1257BB3226ED}\ImagePath = "\\systemroot\\win32k.sys:1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\{79007602-0CDB-4405-9DBF-1257BB3226EE}\ImagePath = "\\systemroot\\win32k.sys:2" rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 2060 rundll32.exe 2060 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeLoadDriverPrivilege 2060 rundll32.exe Token: SeBackupPrivilege 2060 rundll32.exe Token: SeSecurityPrivilege 2060 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2060 2804 rundll32.exe 28 PID 2804 wrote to memory of 2060 2804 rundll32.exe 28 PID 2804 wrote to memory of 2060 2804 rundll32.exe 28 PID 2804 wrote to memory of 2060 2804 rundll32.exe 28 PID 2804 wrote to memory of 2060 2804 rundll32.exe 28 PID 2804 wrote to memory of 2060 2804 rundll32.exe 28 PID 2804 wrote to memory of 2060 2804 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04d721749f2ee7c9dc6ff428cee3dd31_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04d721749f2ee7c9dc6ff428cee3dd31_JaffaCakes118.dll,#12⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2060
-