Analysis
-
max time kernel
52s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
1a5b7269f8a32c5ba80e4803fd0d8b99_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1a5b7269f8a32c5ba80e4803fd0d8b99_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
1a5b7269f8a32c5ba80e4803fd0d8b99_JaffaCakes118.dll
-
Size
9KB
-
MD5
1a5b7269f8a32c5ba80e4803fd0d8b99
-
SHA1
7afdec4e6768cc035b887fa74468302807c43f2f
-
SHA256
4b98ac0e164f4246f27d79a227493abe2ea710d6bf4c4e0308abbff3daa2029e
-
SHA512
d41ca67873c13793822c7e85e35dc3419f532c124bcad76809d1895239a4fd4c68f89a9e06817283074175887268e1b86fb4136eeae10075a941ef16a66930d2
-
SSDEEP
96:HKm1VuMPFv036euw5kiWSAAbe6/PtbeZMTfBPtKet5YYXDrsS0fM/xqtTXcXslhE:qmn3F83uw6lAb1PtbkBC9rUcaXbv
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4440 wrote to memory of 2372 4440 rundll32.exe 82 PID 4440 wrote to memory of 2372 4440 rundll32.exe 82 PID 4440 wrote to memory of 2372 4440 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a5b7269f8a32c5ba80e4803fd0d8b99_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a5b7269f8a32c5ba80e4803fd0d8b99_JaffaCakes118.dll,#12⤵PID:2372
-