Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2024, 15:23

General

  • Target

    13519a6b6f88a04e157a7114893c0dd9_JaffaCakes118.dll

  • Size

    1.9MB

  • MD5

    13519a6b6f88a04e157a7114893c0dd9

  • SHA1

    5b5729e2fd9e1493da7cf5d6faaf66401f28c3ec

  • SHA256

    2eb60124935ec5544fdc53775f4747247d3f08b1615b876c6ad180221b4aaa25

  • SHA512

    df6c37ca7e836b41977ce07637b4407b650b3ae995ccbd6f37ea850184f1d9aba16b03ce0e7040d66fb9b7643ebbacd0f6b14c5ee491d273a083abbb5ef87f0c

  • SSDEEP

    49152:6GCtjGk4R9dSSFF4DUexww8V90vyRbOr0lQ:YJGkC98uSx6e6Q

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\13519a6b6f88a04e157a7114893c0dd9_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\13519a6b6f88a04e157a7114893c0dd9_JaffaCakes118.dll,#1
      2⤵
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Enumerates system info in registry
      PID:1840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\ndgbt\BDMDownload.dll

    Filesize

    158KB

    MD5

    b62367fe2d02b8f47914b088a006d50c

    SHA1

    3743c953e48e6f3f76689423ba9c1ed25e9f86d3

    SHA256

    cbd4c5b6b945620e8b65752dff5a0f0900fc5de2dda8daf3cdda68b1661420b7

    SHA512

    c010e3cc736ac1e10c6af44132d831df34d09bf1e7d1e96fb5c9f571cade04462d442c4b0fd84de92dc68d753a0beab0b4081122d53d516406f0d3c1ec1e0dbb

  • \Users\Admin\AppData\Local\Temp\ndgbt\BDMNetGetInfo.dll

    Filesize

    314KB

    MD5

    12f98be1d919784370eb0f87e78b60d8

    SHA1

    d07de2227b2ec68545be0adeb042af457d68f9e2

    SHA256

    63e34375374ae6cc695c0bc03f1f9aad67e068fc51962fd25edbf2fbeceda9f9

    SHA512

    ab2fcdd3eb7b58f044a855b5cae744bc1b3be599cf0d22ee93ccce2e97cb3bc1f36ea2c1ed75013c76f8c9e4071ba29710595c3a57cda2470885ee9293fc2d8d

  • \Users\Admin\AppData\Local\Temp\ndgbt\dl.dll

    Filesize

    1.1MB

    MD5

    73d5e66dfd5a67869773af0d03aa8d03

    SHA1

    e64f069f5da5e1ca5e0fd521f2e7492492afa795

    SHA256

    46412d2bb040923639e7e5856ed28d734d84baba78d931e663e909f3cb07000a

    SHA512

    37ccfbfcf27e8906731800042856ab97573e150e2798c5b8bf05450e9563b0d3895996c7c055be470ee2c8307bec6e7408b0ac86a2568bf3beceadb21b37b281

  • memory/1840-9-0x00000000001A0000-0x00000000001C8000-memory.dmp

    Filesize

    160KB

  • memory/1840-14-0x0000000000210000-0x000000000025F000-memory.dmp

    Filesize

    316KB

  • memory/1840-19-0x0000000002970000-0x0000000002A87000-memory.dmp

    Filesize

    1.1MB

  • memory/1840-25-0x00000000026C0000-0x000000000270F000-memory.dmp

    Filesize

    316KB