Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 15:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
09657b1fb3e99a46aa97d7512d055413_JaffaCakes118.dll
Resource
win7-20240508-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
09657b1fb3e99a46aa97d7512d055413_JaffaCakes118.dll
Resource
win10v2004-20240611-en
4 signatures
150 seconds
General
-
Target
09657b1fb3e99a46aa97d7512d055413_JaffaCakes118.dll
-
Size
300KB
-
MD5
09657b1fb3e99a46aa97d7512d055413
-
SHA1
418f8f1a25a5535e2507179263602d35468f5eeb
-
SHA256
5956a4120810f4c5d51c1bc2728bd68950d904f7de7f2376c369fd1206c338b0
-
SHA512
3c6d9661301856fcc75c8ac485431947947d30030132eb8e19398cdd7e1e773800f6918c7ad12fceaf3e88fab5a2e78961c73ad1737667f81ecaab785719c07f
-
SSDEEP
6144:tLoRd1ZKQYWpkkYWtwQq/6pn8fgQXhN7to1FTBdmsBvgOXvpBb1xK:tL81UzkYjHU8FhN7to1FTF9gOfK
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1464 rundll32.exe 1464 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1464 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1464 2020 rundll32.exe 28 PID 2020 wrote to memory of 1464 2020 rundll32.exe 28 PID 2020 wrote to memory of 1464 2020 rundll32.exe 28 PID 2020 wrote to memory of 1464 2020 rundll32.exe 28 PID 2020 wrote to memory of 1464 2020 rundll32.exe 28 PID 2020 wrote to memory of 1464 2020 rundll32.exe 28 PID 2020 wrote to memory of 1464 2020 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\09657b1fb3e99a46aa97d7512d055413_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\09657b1fb3e99a46aa97d7512d055413_JaffaCakes118.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464
-