Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 01:48
Static task
static1
Behavioral task
behavioral1
Sample
f93d5b7c4679e82015e2efaa2dfa70ee_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f93d5b7c4679e82015e2efaa2dfa70ee_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f93d5b7c4679e82015e2efaa2dfa70ee_JaffaCakes118.dll
-
Size
432KB
-
MD5
f93d5b7c4679e82015e2efaa2dfa70ee
-
SHA1
5cf705ca2687506ac6bbf04c0133118e5ffcfba6
-
SHA256
72108d267fcae0da4b0684dd18644d977458be138c7e4b2e41ed2daed86b078f
-
SHA512
b0bca6c25797b3323cc90ae99d0672eca79f9ea1455766a0c6640364019e7f68861f1317f8e0714a58bb07ca2cbb117c094c9ada31084e4747b4eadd6808825d
-
SSDEEP
12288:tXRR6v1aBmsXxoZSdWJmJXHgo2Q7T7FSWi8cdpRWnWEW:tXw1awsXqwPJXHOQ71SWiJbRWnWEW
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
rundll32.exedescription ioc process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 2 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\SysWOW64\-93-24-20-121 rundll32.exe File created C:\Windows\SysWOW64\05a rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1692 wrote to memory of 2168 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 2168 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 2168 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 2168 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 2168 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 2168 1692 rundll32.exe rundll32.exe PID 1692 wrote to memory of 2168 1692 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f93d5b7c4679e82015e2efaa2dfa70ee_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f93d5b7c4679e82015e2efaa2dfa70ee_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2168