Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 13:39
Static task
static1
Behavioral task
behavioral1
Sample
fa6b1a8e5c3c6532d34489e59f690e81_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fa6b1a8e5c3c6532d34489e59f690e81_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
fa6b1a8e5c3c6532d34489e59f690e81_JaffaCakes118.dll
-
Size
80KB
-
MD5
fa6b1a8e5c3c6532d34489e59f690e81
-
SHA1
b9b574aa97adc214d7c30e02c6703a07f1685d2a
-
SHA256
60b7902dab5ecf0ab3550f3af139d18f5ad29e69b4e05e8799903df55c1137c8
-
SHA512
dddb40bcd20341c6d87de383fa58244be75419d56cfc48ab483c5b0664449f46cb153e7d0dc19abe71bc4c598110ba8a3b342778391dc9c539a7218220409532
-
SSDEEP
1536:yrhmnsgv/lC5qegCRd6A2b8bYc+nfbjNH1HKhLG:Gsjv9C0DOd6A22YcwfNHYhLG
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
rundll32.exedescription ioc process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 2300 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 3020 wrote to memory of 2300 3020 rundll32.exe rundll32.exe PID 3020 wrote to memory of 2300 3020 rundll32.exe rundll32.exe PID 3020 wrote to memory of 2300 3020 rundll32.exe rundll32.exe PID 3020 wrote to memory of 2300 3020 rundll32.exe rundll32.exe PID 3020 wrote to memory of 2300 3020 rundll32.exe rundll32.exe PID 3020 wrote to memory of 2300 3020 rundll32.exe rundll32.exe PID 3020 wrote to memory of 2300 3020 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa6b1a8e5c3c6532d34489e59f690e81_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa6b1a8e5c3c6532d34489e59f690e81_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses