Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-07-2024 17:18

General

  • Target

    46c735b20826cf3c6c2b254f8a9fff87_JaffaCakes118.dll

  • Size

    15KB

  • MD5

    46c735b20826cf3c6c2b254f8a9fff87

  • SHA1

    22bea2c35a4ed5d5f43472699184c8ac07710104

  • SHA256

    787fb84b58bedc4dd810375b2e367f4d121f7d8fb79d658429d49092a9329678

  • SHA512

    2e3eefc4020769b124dd211c5378a70cf1f8f7e9e04417d42f058de274e8248815747bde79f9fe06950ca7fe4bd248c0354a43e98490a9053ad9790933d420f4

  • SSDEEP

    384:akaP1tw/hqGDZDZttYUYVbnEMesFCsxw/ZAmWmaMcgAEl:aY5qcZtlybnEMesFCsq/amW5Mcgdl

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:584
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3464
        • C:\Windows\system32\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\Temp\46c735b20826cf3c6c2b254f8a9fff87_JaffaCakes118.dll,#1
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4700
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32.exe C:\Users\Admin\AppData\Local\Temp\46c735b20826cf3c6c2b254f8a9fff87_JaffaCakes118.dll,#1
            3⤵
            • Blocklisted process makes network request
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4196
            • C:\Windows\SysWOW64\rundll32.exe
              rundll32.exe "C:\Windows\system32\__c005BCAA.dat",B
              4⤵
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1320

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\__c005BCAA.dat

        Filesize

        15KB

        MD5

        46c735b20826cf3c6c2b254f8a9fff87

        SHA1

        22bea2c35a4ed5d5f43472699184c8ac07710104

        SHA256

        787fb84b58bedc4dd810375b2e367f4d121f7d8fb79d658429d49092a9329678

        SHA512

        2e3eefc4020769b124dd211c5378a70cf1f8f7e9e04417d42f058de274e8248815747bde79f9fe06950ca7fe4bd248c0354a43e98490a9053ad9790933d420f4

      • memory/1320-4-0x0000000010000000-0x000000001000C000-memory.dmp

        Filesize

        48KB

      • memory/1320-5-0x0000000010000000-0x000000001000C000-memory.dmp

        Filesize

        48KB

      • memory/4196-0-0x0000000010000000-0x000000001000C000-memory.dmp

        Filesize

        48KB