Analysis
-
max time kernel
138s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 12:43
Static task
static1
Behavioral task
behavioral1
Sample
67a52721bdb4dd23c51f90aaba2b20a1_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
67a52721bdb4dd23c51f90aaba2b20a1_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
67a52721bdb4dd23c51f90aaba2b20a1_JaffaCakes118.dll
-
Size
2KB
-
MD5
67a52721bdb4dd23c51f90aaba2b20a1
-
SHA1
ed42d71811a362693e039fc4029455cc6d660dc9
-
SHA256
5b0e677ceec57a4ef9890e294e9c71c407163182946576546b30117d58ef2cd8
-
SHA512
d516a2a61fa17a2518856569705e7bff89a82226892d4af9028c23559f3cb37317eb2d3a26f2b5726b2ae9f84ee6f4d2c6767090ca6a52dd1357e5b92f6b68e8
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 908 wrote to memory of 4056 908 rundll32.exe 84 PID 908 wrote to memory of 4056 908 rundll32.exe 84 PID 908 wrote to memory of 4056 908 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67a52721bdb4dd23c51f90aaba2b20a1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67a52721bdb4dd23c51f90aaba2b20a1_JaffaCakes118.dll,#12⤵PID:4056
-