Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 23:44
Behavioral task
behavioral1
Sample
327a7fd64c3c6a80410381db6c693dbb_JaffaCakes118.dll
Resource
win7-20240705-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
327a7fd64c3c6a80410381db6c693dbb_JaffaCakes118.dll
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
327a7fd64c3c6a80410381db6c693dbb_JaffaCakes118.dll
-
Size
76KB
-
MD5
327a7fd64c3c6a80410381db6c693dbb
-
SHA1
88b07eb9c2946ff43448c64a6fb82e1468cdde6f
-
SHA256
0337e616885d0ec4e38adb787dc9fc66c2973a1fef1e7788cfa7103f31a3fd15
-
SHA512
464ec550ac583ceec02823d3fde25973127f86055e9fce56227303aaa3af43678e83f4d4dae78c38341116b534832c340ec6cd332f0369f383cb54c331f81503
-
SSDEEP
1536:Ov5uEmK/Sw3fA3FtQ/TaYKP/nffVXI5EjQAuwNDY7bK:OvMe/S0os2YinXvUw5Y7bK
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2152-0-0x0000000000690000-0x00000000006C8000-memory.dmp upx behavioral1/memory/2152-1-0x0000000000690000-0x00000000006C8000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2064 2152 WerFault.exe 30 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2152 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2152 2516 rundll32.exe 30 PID 2516 wrote to memory of 2152 2516 rundll32.exe 30 PID 2516 wrote to memory of 2152 2516 rundll32.exe 30 PID 2516 wrote to memory of 2152 2516 rundll32.exe 30 PID 2516 wrote to memory of 2152 2516 rundll32.exe 30 PID 2516 wrote to memory of 2152 2516 rundll32.exe 30 PID 2516 wrote to memory of 2152 2516 rundll32.exe 30 PID 2152 wrote to memory of 2064 2152 rundll32.exe 31 PID 2152 wrote to memory of 2064 2152 rundll32.exe 31 PID 2152 wrote to memory of 2064 2152 rundll32.exe 31 PID 2152 wrote to memory of 2064 2152 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\327a7fd64c3c6a80410381db6c693dbb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\327a7fd64c3c6a80410381db6c693dbb_JaffaCakes118.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 5403⤵
- Program crash
PID:2064
-
-