Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 07:45
Static task
static1
Behavioral task
behavioral1
Sample
1a7bdff55777a6722d93c2f7858e340e_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1a7bdff55777a6722d93c2f7858e340e_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
1a7bdff55777a6722d93c2f7858e340e_JaffaCakes118.dll
-
Size
88KB
-
MD5
1a7bdff55777a6722d93c2f7858e340e
-
SHA1
e3024944446fa13cbe00ac8cedcc0ec584e72521
-
SHA256
d1085fff4b8f680a6d87b7742538717676458990ae6f6e7d86e6c02b97f0ff35
-
SHA512
8b7c97f1f6f6604874dda1198dc9f05ceef28aaec4eae289caa133d119b219a539e7fdbc1380d793d1ffad0729a448dc01afe4a72af95b323249363b65d75b58
-
SSDEEP
1536:6zvXT0l1LoW01FyEHMgQ4QnQEjtMMhJzQ2MelyoZ+PRbcV/q:EjoxNAfsgxiQEjFn3TZ+VAy
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
rundll32.exedescription ioc process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 2184 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2364 wrote to memory of 2184 2364 rundll32.exe rundll32.exe PID 2364 wrote to memory of 2184 2364 rundll32.exe rundll32.exe PID 2364 wrote to memory of 2184 2364 rundll32.exe rundll32.exe PID 2364 wrote to memory of 2184 2364 rundll32.exe rundll32.exe PID 2364 wrote to memory of 2184 2364 rundll32.exe rundll32.exe PID 2364 wrote to memory of 2184 2364 rundll32.exe rundll32.exe PID 2364 wrote to memory of 2184 2364 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a7bdff55777a6722d93c2f7858e340e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a7bdff55777a6722d93c2f7858e340e_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses