Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 11:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1b163c875837a55801538efbe7c6e390_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1b163c875837a55801538efbe7c6e390_JaffaCakes118.dll
Resource
win10v2004-20240611-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
1b163c875837a55801538efbe7c6e390_JaffaCakes118.dll
-
Size
15KB
-
MD5
1b163c875837a55801538efbe7c6e390
-
SHA1
889f01ad5c624c8546ca9c089c36bd9bddc97730
-
SHA256
984b7a058f8f173fdc5c4fca52e89871ea7f5b7c50a863e4b9889ffcb0c6d257
-
SHA512
d6db1f51b74e06fed4dbcba8c208b295ee527d76f0a11edbf524ba6b1d3c6c6c1b0f6cb9a63c9fd4a46ea1956887c896aa7e4dc9f6469b154649524ddce37d04
-
SSDEEP
192:q/zNzPmUJvF2E0unFYtDrgTY8Cpo6sGPu9h6VGhddwCrJjmaDSWz5fW16X:q/tmfE0B1rg8C6swbGhdd5JjmkSW9fWi
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1372 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5084 wrote to memory of 1372 5084 rundll32.exe 82 PID 5084 wrote to memory of 1372 5084 rundll32.exe 82 PID 5084 wrote to memory of 1372 5084 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b163c875837a55801538efbe7c6e390_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b163c875837a55801538efbe7c6e390_JaffaCakes118.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:1372
-