Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
e8c31929ecd722a2e9b4a4b6df5faaa6_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e8c31929ecd722a2e9b4a4b6df5faaa6_JaffaCakes118.dll
Resource
win10v2004-20231215-en
General
-
Target
e8c31929ecd722a2e9b4a4b6df5faaa6_JaffaCakes118.dll
-
Size
114KB
-
MD5
e8c31929ecd722a2e9b4a4b6df5faaa6
-
SHA1
1444e87a79d1415e53ca619fd64468a9b1b72bae
-
SHA256
e5aff10a38972a68a89578b616cb6332b7b01f4c1900660fcc7591b769c402da
-
SHA512
608552dfcb011bfc3e7c57f3c6ca8870641effab4434d2953c44d2fe5392874fba9b03499192858580543dca98226e97b6ed5c18642c929163dc3deef2c36036
-
SSDEEP
1536:2cHXQ/VFpDPWI5Fzm4CQgDKJaccxUtrPIEbV/xRjvlZagwM3HD:N3UFRuI5FyYg+cxUVPI8phvlZagf
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1936 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2936 wrote to memory of 1936 2936 rundll32.exe 28 PID 2936 wrote to memory of 1936 2936 rundll32.exe 28 PID 2936 wrote to memory of 1936 2936 rundll32.exe 28 PID 2936 wrote to memory of 1936 2936 rundll32.exe 28 PID 2936 wrote to memory of 1936 2936 rundll32.exe 28 PID 2936 wrote to memory of 1936 2936 rundll32.exe 28 PID 2936 wrote to memory of 1936 2936 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e8c31929ecd722a2e9b4a4b6df5faaa6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e8c31929ecd722a2e9b4a4b6df5faaa6_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:1936
-