Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 18:14
Behavioral task
behavioral1
Sample
4ad645e64f404517df631f477c2a7721_JaffaCakes118.dll
Resource
win7-20240704-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
4ad645e64f404517df631f477c2a7721_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
4ad645e64f404517df631f477c2a7721_JaffaCakes118.dll
-
Size
535KB
-
MD5
4ad645e64f404517df631f477c2a7721
-
SHA1
2cd4ca1fc267d58eb1a3de46ddb3041b6c462746
-
SHA256
b9e68954ee6e3d41a1ebc94203353a69566d7b1c4ea4e83849ffbd6b36adfb3c
-
SHA512
933a899a08452303da760c03db89f74742be2542cfc07525b8828a81906f2983232418caa2b0816a855d523e91f3e36069c2a76abc9a820b05209a4bc5ab221d
-
SSDEEP
12288:xG1WFjvv5F+xBewCPiErdF3Z4mxxp81lEH9P05Zi4:xdFjvv5F+dCPBQmXa12HN6Zi4
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4824 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2696 wrote to memory of 4824 2696 rundll32.exe 83 PID 2696 wrote to memory of 4824 2696 rundll32.exe 83 PID 2696 wrote to memory of 4824 2696 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ad645e64f404517df631f477c2a7721_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ad645e64f404517df631f477c2a7721_JaffaCakes118.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:4824
-