Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 11:16

General

  • Target

    1b163c875837a55801538efbe7c6e390_JaffaCakes118.dll

  • Size

    15KB

  • MD5

    1b163c875837a55801538efbe7c6e390

  • SHA1

    889f01ad5c624c8546ca9c089c36bd9bddc97730

  • SHA256

    984b7a058f8f173fdc5c4fca52e89871ea7f5b7c50a863e4b9889ffcb0c6d257

  • SHA512

    d6db1f51b74e06fed4dbcba8c208b295ee527d76f0a11edbf524ba6b1d3c6c6c1b0f6cb9a63c9fd4a46ea1956887c896aa7e4dc9f6469b154649524ddce37d04

  • SSDEEP

    192:q/zNzPmUJvF2E0unFYtDrgTY8Cpo6sGPu9h6VGhddwCrJjmaDSWz5fW16X:q/tmfE0B1rg8C6swbGhdd5JjmkSW9fWi

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1b163c875837a55801538efbe7c6e390_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1b163c875837a55801538efbe7c6e390_JaffaCakes118.dll,#1
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1372

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1372-0-0x0000000010000000-0x0000000010006000-memory.dmp

    Filesize

    24KB