Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
4ac1e6bb92844ea6b55631c35be3f3b6_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4ac1e6bb92844ea6b55631c35be3f3b6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4ac1e6bb92844ea6b55631c35be3f3b6_JaffaCakes118.dll
-
Size
8KB
-
MD5
4ac1e6bb92844ea6b55631c35be3f3b6
-
SHA1
26a0694bed9c56a0cefaee1a9088471170e55b1f
-
SHA256
a9404018b212ef56cd2ffc0967c7c6856939f6073840db534586c2d751cfd390
-
SHA512
e73e3299a797d604e7ec322228780a2e42ea3ccfdd5cdfc0ef57c1a7a2e62228d3339bcec91a5949d6182ed1dd0019d62ebdf52855b00ec115dbdcf293d80887
-
SSDEEP
192:8FOvMxJuA+MAORnLcKtgCYn/2h+/aEEMyLFLf7FlDBGhD2kgUwuT:ukGIeLc4Ola53FZBgDZJ
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2324 rundll32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2324 2284 rundll32.exe 31 PID 2284 wrote to memory of 2324 2284 rundll32.exe 31 PID 2284 wrote to memory of 2324 2284 rundll32.exe 31 PID 2284 wrote to memory of 2324 2284 rundll32.exe 31 PID 2284 wrote to memory of 2324 2284 rundll32.exe 31 PID 2284 wrote to memory of 2324 2284 rundll32.exe 31 PID 2284 wrote to memory of 2324 2284 rundll32.exe 31 PID 2324 wrote to memory of 1256 2324 rundll32.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ac1e6bb92844ea6b55631c35be3f3b6_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ac1e6bb92844ea6b55631c35be3f3b6_JaffaCakes118.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324
-
-