Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
fbd82621abed95a2d706f7e773b1dc08_JaffaCakes118.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fbd82621abed95a2d706f7e773b1dc08_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
fbd82621abed95a2d706f7e773b1dc08_JaffaCakes118.dll
-
Size
84KB
-
MD5
fbd82621abed95a2d706f7e773b1dc08
-
SHA1
9a46fdcb3f0f0fb64875e19c5747eeeffb8676bc
-
SHA256
55673ff9eb3f24c116c958a5733a9e1f19abd8766fe82260342779d8ebe37d79
-
SHA512
194053ee39554e7642da9bc38f660bc0c5f9cab03683cd5281f3b41f6e73e928015a3624b715f06b1389842184a652c2d6c8fd60d18f16cc827207235a8e7aa1
-
SSDEEP
1536:yygg5smOIb70elcp7ZmK7FzpN121h6WbqZAM7lkxY738:6gbxox7tpin6cqZA8dj8
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
rundll32.exedescription ioc process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 2976 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2956 wrote to memory of 2976 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2976 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2976 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2976 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2976 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2976 2956 rundll32.exe rundll32.exe PID 2956 wrote to memory of 2976 2956 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbd82621abed95a2d706f7e773b1dc08_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbd82621abed95a2d706f7e773b1dc08_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses