Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 11:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1b1f6d05ad7f891d1c60ca431627d2c0_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1b1f6d05ad7f891d1c60ca431627d2c0_JaffaCakes118.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
1b1f6d05ad7f891d1c60ca431627d2c0_JaffaCakes118.dll
-
Size
216KB
-
MD5
1b1f6d05ad7f891d1c60ca431627d2c0
-
SHA1
8007180f3bfafbd244f910713140cff0e538ac03
-
SHA256
c7c389d5f79993203fec645528674b649fa66508df6b7a318702ee8160f46b3b
-
SHA512
3fe2039e30259889250932887258460890402030b211334723bd4698db9f9717b9dd58f3b0d46ea7c8129d77828aa1d5b11beb42594d82f66d2e2978506094d0
-
SSDEEP
3072:0Gfuzq05avPY0PJKn9RuRONEXtBWWa4AJg7ERRttzEPgXCP:0GsgY0RkuR8EXPtIJg7ER5zEPyi
Score
8/10
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\not be run in DOS mode. $\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1b1f6d05ad7f891d1c60ca431627d2c0_JaffaCakes118.dll" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4276 rundll32.exe 4276 rundll32.exe 4276 rundll32.exe 4276 rundll32.exe 4276 rundll32.exe 4276 rundll32.exe 4276 rundll32.exe 4276 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4276 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3192 wrote to memory of 4276 3192 rundll32.exe 92 PID 3192 wrote to memory of 4276 3192 rundll32.exe 92 PID 3192 wrote to memory of 4276 3192 rundll32.exe 92
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b1f6d05ad7f891d1c60ca431627d2c0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b1f6d05ad7f891d1c60ca431627d2c0_JaffaCakes118.dll,#12⤵
- Server Software Component: Terminal Services DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k sysgroup -s not be run in DOS mode. $1⤵PID:1412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4048 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:3948