Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
9424ac4b86d584795d9d09aa1443b479_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9424ac4b86d584795d9d09aa1443b479_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
9424ac4b86d584795d9d09aa1443b479_JaffaCakes118.dll
-
Size
77KB
-
MD5
9424ac4b86d584795d9d09aa1443b479
-
SHA1
8f2a71bbdad32db7c796d8ba07a9c19e853f2bf9
-
SHA256
6663646aa6ab8b4d6468858e7138370ee3e3b7b52e1993636704b6477ba3cc36
-
SHA512
39277b4f5caf8455e76d628dc40264e2cf3028ee9160a861c50ab146580d76aff6f615e437a63a7dd1b837cd0a647243870248b179848b78ae50280b13728819
-
SSDEEP
1536:PJdLac9MFgGxC8cRTFi9AE5G0w/jXjqTwcQ4HBMLD8zbYBxriR+u4:m26JAm50j0sDLD8zs4+u4
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Print Processors 1 TTPs 1 IoCs
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
description ioc Process File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\5C2A.tmp rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\5C2A.tmp rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 3568 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3928 wrote to memory of 3568 3928 rundll32.exe 86 PID 3928 wrote to memory of 3568 3928 rundll32.exe 86 PID 3928 wrote to memory of 3568 3928 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9424ac4b86d584795d9d09aa1443b479_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9424ac4b86d584795d9d09aa1443b479_JaffaCakes118.dll,#12⤵
- Boot or Logon Autostart Execution: Print Processors
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3568
-