Analysis
-
max time kernel
31s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 17:28
Static task
static1
Behavioral task
behavioral1
Sample
facf889a46495eed13a59381a60cc079_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
facf889a46495eed13a59381a60cc079_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
facf889a46495eed13a59381a60cc079_JaffaCakes118.dll
-
Size
141KB
-
MD5
facf889a46495eed13a59381a60cc079
-
SHA1
4f8c4272f62608da534285b69b4e2b5ff74255ee
-
SHA256
2ce54622a2964a36435d34d1cc8800dacb43b980b540dac64f5636de286759ce
-
SHA512
8ad8d007d6e2df545420d7934015af1afa45dd314f651778ab45a6576cb8388aedd444ed514c9f350365c180587fab2b90c101079a314b08e284a32653754a8e
-
SSDEEP
3072:Eomy9OVf/YYEezo8usyBoUvYYYD3zKneQygZgC0Pgs:Eo5GYYS8usMfYYO3TcZgCEg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
setup662320576.exepid process 3008 setup662320576.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exesetup662320576.exepid process 2732 rundll32.exe 3008 setup662320576.exe 3008 setup662320576.exe 3008 setup662320576.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
setup662320576.exedescription ioc process File opened for modification \??\physicaldrive0 setup662320576.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
setup662320576.exedescription pid process Token: SeShutdownPrivilege 3008 setup662320576.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2044 wrote to memory of 2732 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 2732 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 2732 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 2732 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 2732 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 2732 2044 rundll32.exe rundll32.exe PID 2044 wrote to memory of 2732 2044 rundll32.exe rundll32.exe PID 2732 wrote to memory of 3008 2732 rundll32.exe setup662320576.exe PID 2732 wrote to memory of 3008 2732 rundll32.exe setup662320576.exe PID 2732 wrote to memory of 3008 2732 rundll32.exe setup662320576.exe PID 2732 wrote to memory of 3008 2732 rundll32.exe setup662320576.exe PID 2732 wrote to memory of 3008 2732 rundll32.exe setup662320576.exe PID 2732 wrote to memory of 3008 2732 rundll32.exe setup662320576.exe PID 2732 wrote to memory of 3008 2732 rundll32.exe setup662320576.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\facf889a46495eed13a59381a60cc079_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\facf889a46495eed13a59381a60cc079_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\setup662320576.exe"C:\Users\Admin\AppData\Local\Temp\setup662320576.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD531111b7c81a733571a7cc06e635dd28d
SHA13b9a6d377ba3e796267244399b7b5cee2667d199
SHA256ba1c013de3d76096a9783608b28039d01ebb187b5b9d53aeee0cbaaef7b2bb8f
SHA5121fe5cc2cb0c1f10679c43cec1cbb254ce0005b583ebfadb8cc62c17f81263723398b8f67b9db20ca2dd058e04aeb40e846b6bbd495762871f472bce7acc17da5