Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-04-2024 10:54

General

  • Target

    fa25aeece8408ff347245de865937571_JaffaCakes118.dll

  • Size

    384KB

  • MD5

    fa25aeece8408ff347245de865937571

  • SHA1

    39e75d87e3ee217882b612c1117f4a1dc57edda3

  • SHA256

    96316cff7766e81088fc562cd629c69a3020f44e878ccf4f3141527e2bc74c1a

  • SHA512

    05ac90c256f3f60bf9bb317da14f33e48962db3ba08ac513f15ae0edff2d98a51381b92c97d9af619911168a7ab5e6d430e5389f74f531a6db1f100e7aacd3a4

  • SSDEEP

    6144:bzOIjTl9iMXovRwEkZzUWe2c5kEdOWImA9O98wfCqwv/Dj/evTqgnIEBxf:bzViMX0+E5Wer2aIpUeQluav2gnIEBt

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 33 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 19 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fa25aeece8408ff347245de865937571_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\fa25aeece8408ff347245de865937571_JaffaCakes118.dll,#1
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/4bl4.dll"
        3⤵
          PID:2268
        • C:\Windows\SysWOW64\regsvr32.exe
          C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/c6cb.dll"
          3⤵
            PID:2044
          • C:\Windows\SysWOW64\regsvr32.exe
            C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/353r.dll"
            3⤵
              PID:2792
            • C:\Windows\SysWOW64\regsvr32.exe
              C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/b33o.dll"
              3⤵
                PID:5032
              • C:\Windows\SysWOW64\regsvr32.exe
                C:\Windows\system32\regsvr32.exe /s "C:\Windows\system32/b33o.dll"
                3⤵
                • Loads dropped DLL
                • Installs/modifies Browser Helper Object
                • Modifies registry class
                PID:1548
              • C:\Windows\SysWOW64\36bd.exe
                C:\Windows\system32/36bd.exe -i
                3⤵
                • Executes dropped EXE
                PID:4068
              • C:\Windows\SysWOW64\36bd.exe
                C:\Windows\system32/36bd.exe -s
                3⤵
                • Executes dropped EXE
                PID:1456
              • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exe
                C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exe
                3⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of SetWindowsHookEx
                PID:3536
              • C:\Windows\SysWOW64\rundll32.exe
                C:\Windows\system32\rundll32 C:\Windows\system32/36be.dll, Always
                3⤵
                • Loads dropped DLL
                PID:3456
          • C:\Windows\SysWOW64\36bd.exe
            C:\Windows\SysWOW64\36bd.exe
            1⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Writes to the Master Boot Record (MBR)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3760
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32 C:\Windows\system32/36be.dll,Always
              2⤵
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • Drops file in System32 directory
              PID:2028

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Persistence

          Browser Extensions

          1
          T1176

          Pre-OS Boot

          1
          T1542

          Bootkit

          1
          T1542.003

          Defense Evasion

          Modify Registry

          1
          T1112

          Pre-OS Boot

          1
          T1542

          Bootkit

          1
          T1542.003

          Discovery

          System Information Discovery

          1
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\b.dll
            Filesize

            103KB

            MD5

            428b16d93073d170c2e64c3bcdceadd2

            SHA1

            57ac436468862f595c5b7606e62bef65038bf29e

            SHA256

            15f93e203c0890f77b998fbd05c42991b3b0dc1221e67ff11a545549802a7748

            SHA512

            6348ceb9fcce54510ff7c87f3741d672ca36a259a943f26828f3586c90f09917b70134a0fbf5232933dc8a435f5e6c7295369b407ea34a8ff2159e48f045d768

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exe
            Filesize

            92KB

            MD5

            bb2485769fdeffac518c8ae204416a7a

            SHA1

            a41fdea05b6a9b287c7bf854464e398d848eb7e3

            SHA256

            ea958a23d4a5c5be4321002af31ae95de1c1398da6881e2aa8933ba0b03f0bc1

            SHA512

            1e7d36958ab38c11b830a89ab6969126d183a54bc6d07dcec0e3f776b595db24e91b6e4c8120ac6b4edb3e9fedab447c33653001975c0f5b51655761cc740b8f

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\p.dll
            Filesize

            489KB

            MD5

            e42367274f8ee73479b303b70a8446d0

            SHA1

            3c68ce1cc50e4a8d0c227c0bff799b4a84bb1a0b

            SHA256

            82c08f3ee03a1fe9ea4e1aac22d3549be77d263eace18805d77116b4bc06f9ea

            SHA512

            91c6486931a17f436d508e093c754589ef8cfe1411dcad1308814db4c0a599dc4b25618c090361de6f5ceaaee880bf9f05e7f3a012b35efb4b52e7360f0dc4fc

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\s.exe
            Filesize

            176KB

            MD5

            5603fb6d4561416b9579fea25f826f8d

            SHA1

            0f2da1544930ce34d2e36f8af89320f1a7a20216

            SHA256

            216b0b65e0a367c12b6251027e75df9445eddd8821c376019053c395327e7198

            SHA512

            e017eaef1cda9eff52685320c9d84a8f46a660ae2a1092444e10da2bbc8aab7d3a315605abdceee05519a48bbaa72da209fad79293d8d0c8b5e837da34da3631

          • C:\Windows\Temp\tmp.exe
            Filesize

            140KB

            MD5

            4894817ddf40549627acb62660050f0d

            SHA1

            1729959706cd575d164c6be3b85579fd6ee4f430

            SHA256

            6c994e71a91dc2b4071ccc513a06517d54226410a6c900b660e697f28db8ef6f

            SHA512

            b9424100bddb938b905c95f4528e8aca727c6376962f4c43811532be93be34dd6be49b97c742d9f6b1a74ee4c883216d37f9487145de0d032013a7b452d3382d

          • memory/1548-58-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/1548-59-0x00000000009B0000-0x00000000009B2000-memory.dmp
            Filesize

            8KB

          • memory/2436-0-0x0000000010000000-0x0000000010079000-memory.dmp
            Filesize

            484KB

          • memory/2436-1-0x00000000025C0000-0x00000000025C2000-memory.dmp
            Filesize

            8KB

          • memory/3760-140-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-150-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-108-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-109-0x0000000000520000-0x0000000000522000-memory.dmp
            Filesize

            8KB

          • memory/3760-111-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-112-0x0000000000C80000-0x0000000000C82000-memory.dmp
            Filesize

            8KB

          • memory/3760-114-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-115-0x0000000000C90000-0x0000000000C92000-memory.dmp
            Filesize

            8KB

          • memory/3760-118-0x0000000000CA0000-0x0000000000CA2000-memory.dmp
            Filesize

            8KB

          • memory/3760-117-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-121-0x0000000000CB0000-0x0000000000CB2000-memory.dmp
            Filesize

            8KB

          • memory/3760-120-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-123-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-124-0x0000000000E50000-0x0000000000E52000-memory.dmp
            Filesize

            8KB

          • memory/3760-126-0x0000000000E60000-0x0000000000E62000-memory.dmp
            Filesize

            8KB

          • memory/3760-128-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-129-0x0000000000E70000-0x0000000000E72000-memory.dmp
            Filesize

            8KB

          • memory/3760-131-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-132-0x0000000000E80000-0x0000000000E82000-memory.dmp
            Filesize

            8KB

          • memory/3760-134-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-135-0x0000000000E90000-0x0000000000E92000-memory.dmp
            Filesize

            8KB

          • memory/3760-138-0x0000000000EA0000-0x0000000000EA2000-memory.dmp
            Filesize

            8KB

          • memory/3760-137-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-74-0x0000000000510000-0x0000000000512000-memory.dmp
            Filesize

            8KB

          • memory/3760-141-0x00000000012C0000-0x00000000012C2000-memory.dmp
            Filesize

            8KB

          • memory/3760-143-0x00000000012D0000-0x00000000012D2000-memory.dmp
            Filesize

            8KB

          • memory/3760-145-0x00000000012E0000-0x00000000012E2000-memory.dmp
            Filesize

            8KB

          • memory/3760-147-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-148-0x00000000012F0000-0x00000000012F2000-memory.dmp
            Filesize

            8KB

          • memory/3760-73-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-151-0x0000000001300000-0x0000000001302000-memory.dmp
            Filesize

            8KB

          • memory/3760-153-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-154-0x0000000001310000-0x0000000001312000-memory.dmp
            Filesize

            8KB

          • memory/3760-157-0x0000000001320000-0x0000000001322000-memory.dmp
            Filesize

            8KB

          • memory/3760-156-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-159-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-160-0x0000000001330000-0x0000000001332000-memory.dmp
            Filesize

            8KB

          • memory/3760-162-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-163-0x0000000001340000-0x0000000001342000-memory.dmp
            Filesize

            8KB

          • memory/3760-166-0x0000000001350000-0x0000000001352000-memory.dmp
            Filesize

            8KB

          • memory/3760-165-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-168-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-169-0x0000000001360000-0x0000000001362000-memory.dmp
            Filesize

            8KB

          • memory/3760-171-0x0000000001370000-0x0000000001372000-memory.dmp
            Filesize

            8KB

          • memory/3760-173-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-174-0x0000000001380000-0x0000000001382000-memory.dmp
            Filesize

            8KB

          • memory/3760-176-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-177-0x0000000001390000-0x0000000001392000-memory.dmp
            Filesize

            8KB

          • memory/3760-178-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-181-0x00000000013A0000-0x00000000013A2000-memory.dmp
            Filesize

            8KB

          • memory/3760-180-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-183-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-184-0x0000000000CC0000-0x0000000000CC2000-memory.dmp
            Filesize

            8KB

          • memory/3760-186-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-187-0x0000000000CD0000-0x0000000000CD2000-memory.dmp
            Filesize

            8KB

          • memory/3760-189-0x0000000010000000-0x0000000010020000-memory.dmp
            Filesize

            128KB

          • memory/3760-190-0x0000000000CE0000-0x0000000000CE2000-memory.dmp
            Filesize

            8KB