Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 22:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3227d180abf1cb779e9d44ae974597f0_JaffaCakes118.dll
Resource
win7-20240704-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
3227d180abf1cb779e9d44ae974597f0_JaffaCakes118.dll
Resource
win10v2004-20240709-en
4 signatures
150 seconds
General
-
Target
3227d180abf1cb779e9d44ae974597f0_JaffaCakes118.dll
-
Size
9KB
-
MD5
3227d180abf1cb779e9d44ae974597f0
-
SHA1
21e5ef4393399836531e29ab2222a6dd2da0c46a
-
SHA256
23940f66a64c4c0746a9945f4872f4ab1b9519746b3666168bdac4d28b5d5e0b
-
SHA512
4eb3f144f5d19b9e31dc47c6b80375f9550f10fc76c44642893ff10f6d04b23f49f042a994d1c2b3620aa197f0e93b8306386abcc1baad81e5a7185206b96ecd
-
SSDEEP
192:/Gg1mser84CgXrHUAyI0YtR/zaHZPf9VuiaInouk8kgUw6J:/Gg1msg8LKHByibz8tfbRo5b
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\sperls.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\sperls.dll rundll32.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe 5020 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5020 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3920 wrote to memory of 5020 3920 rundll32.exe 81 PID 3920 wrote to memory of 5020 3920 rundll32.exe 81 PID 3920 wrote to memory of 5020 3920 rundll32.exe 81 PID 5020 wrote to memory of 3392 5020 rundll32.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3392
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3227d180abf1cb779e9d44ae974597f0_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3227d180abf1cb779e9d44ae974597f0_JaffaCakes118.dll,#13⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5020
-
-