Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 04:17
Static task
static1
Behavioral task
behavioral1
Sample
2af32dfd3fffe59dbcba4a9580cf4d30_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2af32dfd3fffe59dbcba4a9580cf4d30_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2af32dfd3fffe59dbcba4a9580cf4d30_JaffaCakes118.dll
-
Size
13KB
-
MD5
2af32dfd3fffe59dbcba4a9580cf4d30
-
SHA1
c40cf274c408048ca62507658cdf041df0fa43cd
-
SHA256
ad7841bf1fcae5bf4291e8d5a8489f2a875ae0947f4757e408d3a31c28c79870
-
SHA512
7b374ef4b5c00689887556795e4e8b527ab2c0366e9b82632177f132a67ff71e5382603e5d2b1042a01a3ee20b1700603d9339e972889d79e01e0fa653af9d57
-
SSDEEP
384:mjGmDrILipqOUK3H+NEUgQIrUiPOI9kucwRQk/:MvIGI4KEUgX35cZe
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msosmhfp00.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\msosmhfp00.dll rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2784 rundll32.exe 2784 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2784 rundll32.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2784 3004 rundll32.exe 30 PID 3004 wrote to memory of 2784 3004 rundll32.exe 30 PID 3004 wrote to memory of 2784 3004 rundll32.exe 30 PID 3004 wrote to memory of 2784 3004 rundll32.exe 30 PID 3004 wrote to memory of 2784 3004 rundll32.exe 30 PID 3004 wrote to memory of 2784 3004 rundll32.exe 30 PID 3004 wrote to memory of 2784 3004 rundll32.exe 30 PID 2784 wrote to memory of 256 2784 rundll32.exe 1 PID 2784 wrote to memory of 336 2784 rundll32.exe 2 PID 2784 wrote to memory of 384 2784 rundll32.exe 3 PID 2784 wrote to memory of 396 2784 rundll32.exe 4 PID 2784 wrote to memory of 432 2784 rundll32.exe 5 PID 2784 wrote to memory of 480 2784 rundll32.exe 6 PID 2784 wrote to memory of 488 2784 rundll32.exe 7 PID 2784 wrote to memory of 496 2784 rundll32.exe 8 PID 2784 wrote to memory of 612 2784 rundll32.exe 9 PID 2784 wrote to memory of 688 2784 rundll32.exe 10 PID 2784 wrote to memory of 752 2784 rundll32.exe 11 PID 2784 wrote to memory of 832 2784 rundll32.exe 12 PID 2784 wrote to memory of 872 2784 rundll32.exe 13 PID 2784 wrote to memory of 984 2784 rundll32.exe 15 PID 2784 wrote to memory of 284 2784 rundll32.exe 16 PID 2784 wrote to memory of 236 2784 rundll32.exe 17 PID 2784 wrote to memory of 1084 2784 rundll32.exe 18 PID 2784 wrote to memory of 1124 2784 rundll32.exe 19 PID 2784 wrote to memory of 1180 2784 rundll32.exe 20 PID 2784 wrote to memory of 1232 2784 rundll32.exe 21 PID 2784 wrote to memory of 1304 2784 rundll32.exe 23 PID 2784 wrote to memory of 1536 2784 rundll32.exe 24 PID 2784 wrote to memory of 1668 2784 rundll32.exe 25 PID 2784 wrote to memory of 2440 2784 rundll32.exe 26 PID 2784 wrote to memory of 2532 2784 rundll32.exe 27 PID 2784 wrote to memory of 3004 2784 rundll32.exe 29
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:612
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1536
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1668
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:688
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:752
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:832
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1180
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:872
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:984
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:284
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:236
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1084
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1124
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1304
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2440
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2532
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:488
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:496
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:396
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2af32dfd3fffe59dbcba4a9580cf4d30_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2af32dfd3fffe59dbcba4a9580cf4d30_JaffaCakes118.dll,#13⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784
-
-