Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 16:38
Behavioral task
behavioral1
Sample
09a4d05a2a42191f93c0f78a92b766e3_JaffaCakes118.dll
Resource
win7-20240611-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
09a4d05a2a42191f93c0f78a92b766e3_JaffaCakes118.dll
Resource
win10v2004-20240508-en
3 signatures
150 seconds
General
-
Target
09a4d05a2a42191f93c0f78a92b766e3_JaffaCakes118.dll
-
Size
548KB
-
MD5
09a4d05a2a42191f93c0f78a92b766e3
-
SHA1
086a836c6c3a06fa6246fa4532f8d0b647e1e40b
-
SHA256
13815a2db1aef308f2be66b674a9c3dd166390ead36a4aea6707aa2a2d79cd96
-
SHA512
e5d30c46207118edb786e251869bd5e9bd87e63433a76febbc01332beb0e888c388e89ce48daa552a1b3b10c8ace802e72ad114f225c227a4bb96449429cbcf2
-
SSDEEP
12288:b64aIkqLJ6ajedvbHAimByOtm5O+PVLURYkiEWvfoS:b6iZ6VjCp+PayoW
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2164-3-0x0000000002090000-0x000000000227C000-memory.dmp upx behavioral1/memory/2164-2-0x0000000002090000-0x000000000227C000-memory.dmp upx behavioral1/memory/2164-1-0x0000000002090000-0x000000000227C000-memory.dmp upx behavioral1/memory/2164-5-0x0000000002090000-0x000000000227C000-memory.dmp upx behavioral1/memory/2164-8-0x0000000002090000-0x000000000227C000-memory.dmp upx behavioral1/memory/2164-9-0x0000000002090000-0x000000000227C000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2164 rundll32.exe 2164 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2164 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2164 2240 rundll32.exe 28 PID 2240 wrote to memory of 2164 2240 rundll32.exe 28 PID 2240 wrote to memory of 2164 2240 rundll32.exe 28 PID 2240 wrote to memory of 2164 2240 rundll32.exe 28 PID 2240 wrote to memory of 2164 2240 rundll32.exe 28 PID 2240 wrote to memory of 2164 2240 rundll32.exe 28 PID 2240 wrote to memory of 2164 2240 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\09a4d05a2a42191f93c0f78a92b766e3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\09a4d05a2a42191f93c0f78a92b766e3_JaffaCakes118.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2164
-