Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
4ac1e6bb92844ea6b55631c35be3f3b6_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4ac1e6bb92844ea6b55631c35be3f3b6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4ac1e6bb92844ea6b55631c35be3f3b6_JaffaCakes118.dll
-
Size
8KB
-
MD5
4ac1e6bb92844ea6b55631c35be3f3b6
-
SHA1
26a0694bed9c56a0cefaee1a9088471170e55b1f
-
SHA256
a9404018b212ef56cd2ffc0967c7c6856939f6073840db534586c2d751cfd390
-
SHA512
e73e3299a797d604e7ec322228780a2e42ea3ccfdd5cdfc0ef57c1a7a2e62228d3339bcec91a5949d6182ed1dd0019d62ebdf52855b00ec115dbdcf293d80887
-
SSDEEP
192:8FOvMxJuA+MAORnLcKtgCYn/2h+/aEEMyLFLf7FlDBGhD2kgUwuT:ukGIeLc4Ola53FZBgDZJ
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2920 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4868 wrote to memory of 2920 4868 rundll32.exe 83 PID 4868 wrote to memory of 2920 4868 rundll32.exe 83 PID 4868 wrote to memory of 2920 4868 rundll32.exe 83 PID 2920 wrote to memory of 3548 2920 rundll32.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3548
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ac1e6bb92844ea6b55631c35be3f3b6_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ac1e6bb92844ea6b55631c35be3f3b6_JaffaCakes118.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920
-
-