Analysis
-
max time kernel
41s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 20:56
Static task
static1
Behavioral task
behavioral1
Sample
262e3d20c671202d83f34c83eda52462_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
262e3d20c671202d83f34c83eda52462_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
262e3d20c671202d83f34c83eda52462_JaffaCakes118.dll
-
Size
37KB
-
MD5
262e3d20c671202d83f34c83eda52462
-
SHA1
e47a1a76408b1c00bbea4406a93bee8701787d6b
-
SHA256
1c8e054f9edf57d3d8927c851773ae449893d1cd0576d2af9d2be9814bb50e7c
-
SHA512
141498e4b378e4edd3c935dcf79d22651b9e6f9d55f227cb424a7b7b1a19190968f2bfcfb62e8e756f548124a5fc142c93d7b05f0ba4a7b8034403421360362f
-
SSDEEP
768:LhradP1OSInWNHEsCaTHwQR2kI1FGL2zCXQMz6:FWh1OSInW31EFA
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2468 2340 rundll32.exe 81 PID 2340 wrote to memory of 2468 2340 rundll32.exe 81 PID 2340 wrote to memory of 2468 2340 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\262e3d20c671202d83f34c83eda52462_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\262e3d20c671202d83f34c83eda52462_JaffaCakes118.dll,#12⤵PID:2468
-