Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
13519a6b6f88a04e157a7114893c0dd9_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13519a6b6f88a04e157a7114893c0dd9_JaffaCakes118.dll
Resource
win10v2004-20240419-en
General
-
Target
13519a6b6f88a04e157a7114893c0dd9_JaffaCakes118.dll
-
Size
1.9MB
-
MD5
13519a6b6f88a04e157a7114893c0dd9
-
SHA1
5b5729e2fd9e1493da7cf5d6faaf66401f28c3ec
-
SHA256
2eb60124935ec5544fdc53775f4747247d3f08b1615b876c6ad180221b4aaa25
-
SHA512
df6c37ca7e836b41977ce07637b4407b650b3ae995ccbd6f37ea850184f1d9aba16b03ce0e7040d66fb9b7643ebbacd0f6b14c5ee491d273a083abbb5ef87f0c
-
SSDEEP
49152:6GCtjGk4R9dSSFF4DUexww8V90vyRbOr0lQ:YJGkC98uSx6e6Q
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2284 wrote to memory of 1840 2284 rundll32.exe 28 PID 2284 wrote to memory of 1840 2284 rundll32.exe 28 PID 2284 wrote to memory of 1840 2284 rundll32.exe 28 PID 2284 wrote to memory of 1840 2284 rundll32.exe 28 PID 2284 wrote to memory of 1840 2284 rundll32.exe 28 PID 2284 wrote to memory of 1840 2284 rundll32.exe 28 PID 2284 wrote to memory of 1840 2284 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\13519a6b6f88a04e157a7114893c0dd9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\13519a6b6f88a04e157a7114893c0dd9_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Enumerates system info in registry
PID:1840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158KB
MD5b62367fe2d02b8f47914b088a006d50c
SHA13743c953e48e6f3f76689423ba9c1ed25e9f86d3
SHA256cbd4c5b6b945620e8b65752dff5a0f0900fc5de2dda8daf3cdda68b1661420b7
SHA512c010e3cc736ac1e10c6af44132d831df34d09bf1e7d1e96fb5c9f571cade04462d442c4b0fd84de92dc68d753a0beab0b4081122d53d516406f0d3c1ec1e0dbb
-
Filesize
314KB
MD512f98be1d919784370eb0f87e78b60d8
SHA1d07de2227b2ec68545be0adeb042af457d68f9e2
SHA25663e34375374ae6cc695c0bc03f1f9aad67e068fc51962fd25edbf2fbeceda9f9
SHA512ab2fcdd3eb7b58f044a855b5cae744bc1b3be599cf0d22ee93ccce2e97cb3bc1f36ea2c1ed75013c76f8c9e4071ba29710595c3a57cda2470885ee9293fc2d8d
-
Filesize
1.1MB
MD573d5e66dfd5a67869773af0d03aa8d03
SHA1e64f069f5da5e1ca5e0fd521f2e7492492afa795
SHA25646412d2bb040923639e7e5856ed28d734d84baba78d931e663e909f3cb07000a
SHA51237ccfbfcf27e8906731800042856ab97573e150e2798c5b8bf05450e9563b0d3895996c7c055be470ee2c8307bec6e7408b0ac86a2568bf3beceadb21b37b281