Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
46207a3cb5589805739982553d7199c5_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
46207a3cb5589805739982553d7199c5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
46207a3cb5589805739982553d7199c5_JaffaCakes118.dll
-
Size
11KB
-
MD5
46207a3cb5589805739982553d7199c5
-
SHA1
e9c0957a313f93d2cee37a90c64117416b352067
-
SHA256
129383862e9fa9173afd5d952cd9f42f64456f21991ed9c0e80138f76f277078
-
SHA512
ae4f2cb5c75615b4ff430123ba4e31154323fccab7cc9c8f24de7f9580ba089705c2255bc2146acc2e2e37993f5ee79b2575a5200348a2319fc466b10c6f0d36
-
SSDEEP
192:WCda+bmBWEV7cEZF3aWy08fxSkBkZLSa9TzZA/rooE/272z8uPGUo7t0hTqkgUwk:LaYmkYjT3zkJSakZLS61Azg/2LlUoJSv
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2760 rundll32.exe 2760 rundll32.exe 2760 rundll32.exe 2760 rundll32.exe 2760 rundll32.exe 2760 rundll32.exe 2760 rundll32.exe 2760 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2760 rundll32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2760 1276 rundll32.exe 30 PID 1276 wrote to memory of 2760 1276 rundll32.exe 30 PID 1276 wrote to memory of 2760 1276 rundll32.exe 30 PID 1276 wrote to memory of 2760 1276 rundll32.exe 30 PID 1276 wrote to memory of 2760 1276 rundll32.exe 30 PID 1276 wrote to memory of 2760 1276 rundll32.exe 30 PID 1276 wrote to memory of 2760 1276 rundll32.exe 30 PID 2760 wrote to memory of 1188 2760 rundll32.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46207a3cb5589805739982553d7199c5_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46207a3cb5589805739982553d7199c5_JaffaCakes118.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760
-
-