Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
3905129563b0e1a3ff2f6fe9787b8a2a_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3905129563b0e1a3ff2f6fe9787b8a2a_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3905129563b0e1a3ff2f6fe9787b8a2a_JaffaCakes118.dll
-
Size
2KB
-
MD5
3905129563b0e1a3ff2f6fe9787b8a2a
-
SHA1
35424ffcf4af8bd768ec808dab81f40216e932fd
-
SHA256
1ac5aa1ce113731e8a3859a245cee8dada8bdcbdf970b335d9e13c7f987ae2b2
-
SHA512
c4b15f7098cf50d82776d40d6a2a8f18cb14f50836735433ea7c1bc36335a85c9fc51dd3d2caaa864c35e860dafcb55a10f119898575ee50d25eb23974feedb6
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1488 wrote to memory of 528 1488 rundll32.exe 30 PID 1488 wrote to memory of 528 1488 rundll32.exe 30 PID 1488 wrote to memory of 528 1488 rundll32.exe 30 PID 1488 wrote to memory of 528 1488 rundll32.exe 30 PID 1488 wrote to memory of 528 1488 rundll32.exe 30 PID 1488 wrote to memory of 528 1488 rundll32.exe 30 PID 1488 wrote to memory of 528 1488 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3905129563b0e1a3ff2f6fe9787b8a2a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3905129563b0e1a3ff2f6fe9787b8a2a_JaffaCakes118.dll,#12⤵PID:528
-