Analysis
-
max time kernel
128s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 22:27
Behavioral task
behavioral1
Sample
17c28486e68d77561ad0c9fdb38c32af_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17c28486e68d77561ad0c9fdb38c32af_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
17c28486e68d77561ad0c9fdb38c32af_JaffaCakes118.dll
-
Size
66KB
-
MD5
17c28486e68d77561ad0c9fdb38c32af
-
SHA1
c27b625cf42272507f06bd7f81264a2f213701a6
-
SHA256
9a5fb1e780cd2e99abfe2146fceb7bba9a973e4c3ed20d74ae11dd128cd12a74
-
SHA512
a9a8c957039393ab944e4420246311e7bc82f0383d8fed9cf6e04a69ae07a3eee65e3388122c02cd4934b64ab5174902ef4aaa5dab92212d73c3f8da1fb9d254
-
SSDEEP
1536:6eD44YF3StnpVeQY0NWtI+pwPb2rQwa29mDTz/8w:61F3SxpZY1I+pJ7aimF
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
resource yara_rule behavioral2/memory/2984-0-0x000000000E000000-0x000000000E022000-memory.dmp vmprotect -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2984 1596 rundll32.exe 82 PID 1596 wrote to memory of 2984 1596 rundll32.exe 82 PID 1596 wrote to memory of 2984 1596 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17c28486e68d77561ad0c9fdb38c32af_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17c28486e68d77561ad0c9fdb38c32af_JaffaCakes118.dll,#12⤵PID:2984
-