Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
4512afcf04e14ab9be2f8dcbf3d1d6f2_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4512afcf04e14ab9be2f8dcbf3d1d6f2_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4512afcf04e14ab9be2f8dcbf3d1d6f2_JaffaCakes118.dll
-
Size
439KB
-
MD5
4512afcf04e14ab9be2f8dcbf3d1d6f2
-
SHA1
b5032f8bdfa9b7bdbb192780b074acaf212f76c5
-
SHA256
48ba68e512a0649cb51d11dd03f52c74f64c0a30e533c26ade6652fe9b4a5fd8
-
SHA512
439339cec48959103ed674c7cd8ebf967ee3a3f9c210d020550a57d40a0db09bd018f2bdb51aa53808771d5004b5756a420a8e02c6bf97960cb9ce20edb34e82
-
SSDEEP
6144:62llZL0bMvUk2xe0OOPcTeoaFjXEdcmfjq5QWXLDVzGg23jn6T:VL0bMvk3jbX6Hjq5QWbVV23jn0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2356 wrote to memory of 1732 2356 rundll32.exe 30 PID 2356 wrote to memory of 1732 2356 rundll32.exe 30 PID 2356 wrote to memory of 1732 2356 rundll32.exe 30 PID 2356 wrote to memory of 1732 2356 rundll32.exe 30 PID 2356 wrote to memory of 1732 2356 rundll32.exe 30 PID 2356 wrote to memory of 1732 2356 rundll32.exe 30 PID 2356 wrote to memory of 1732 2356 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4512afcf04e14ab9be2f8dcbf3d1d6f2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4512afcf04e14ab9be2f8dcbf3d1d6f2_JaffaCakes118.dll,#12⤵PID:1732
-