Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 01:20
Behavioral task
behavioral1
Sample
2423bd29c0c60b35642ca274b7ae04f9_JaffaCakes118.dll
Resource
win7-20240611-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
2423bd29c0c60b35642ca274b7ae04f9_JaffaCakes118.dll
Resource
win10v2004-20240508-en
6 signatures
150 seconds
General
-
Target
2423bd29c0c60b35642ca274b7ae04f9_JaffaCakes118.dll
-
Size
246KB
-
MD5
2423bd29c0c60b35642ca274b7ae04f9
-
SHA1
949d6130adf78e8b097e6504bb94fb7e4bc27144
-
SHA256
36009dca84fd751500eeedd3d0e99983b985790ed18891014cd86f3befc79a6b
-
SHA512
e40147ca18f5e20f397210d9c534213516ada62d2ceaa659453eb46a828d60dac23e0ed6496182d8c5188d1471688e3540a4b9a91ccdb197c2671574699bd8d0
-
SSDEEP
768:B2e414z6bZrXYcd+hOypl9kVxO8CGLZvt2DjL+:B2e4SzaZjYwUOyplKVxPLl
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2172-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2172 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2172 1672 rundll32.exe 28 PID 1672 wrote to memory of 2172 1672 rundll32.exe 28 PID 1672 wrote to memory of 2172 1672 rundll32.exe 28 PID 1672 wrote to memory of 2172 1672 rundll32.exe 28 PID 1672 wrote to memory of 2172 1672 rundll32.exe 28 PID 1672 wrote to memory of 2172 1672 rundll32.exe 28 PID 1672 wrote to memory of 2172 1672 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2423bd29c0c60b35642ca274b7ae04f9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2423bd29c0c60b35642ca274b7ae04f9_JaffaCakes118.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2172
-