Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 07:07
Behavioral task
behavioral1
Sample
71354278675a4deea20fb3cbb5f77170_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
71354278675a4deea20fb3cbb5f77170_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
71354278675a4deea20fb3cbb5f77170_JaffaCakes118.dll
-
Size
740KB
-
MD5
71354278675a4deea20fb3cbb5f77170
-
SHA1
073e9f1db6c1be847f186553e985e35e4de03c70
-
SHA256
7b6acb5e2c245b8cfda77fced2cc0e94108384cd1b9ffc8510e7304fcb9feb6c
-
SHA512
e664f02f2d2918c30a6fb75ab7dfe22ab0f2eea8e7ebbcd5b211463062744e51e3956d320127570db0b5dc9c12fb39c6b204bc2967bd4708bccab17d5c980915
-
SSDEEP
12288:NRJ6OytWOdpAFN0i2J+twkFFNQXNxE+VOvQ3tKDuztSVPXQdlO3BuOmuVbAA/IFv:ND7rO7qNp2gNQ9xqkYDWYPgiEdgAA/VS
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
rundll32.exedescription ioc process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1692 2188 WerFault.exe rundll32.exe -
Modifies registry class 3 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2416 wrote to memory of 2188 2416 rundll32.exe rundll32.exe PID 2416 wrote to memory of 2188 2416 rundll32.exe rundll32.exe PID 2416 wrote to memory of 2188 2416 rundll32.exe rundll32.exe PID 2416 wrote to memory of 2188 2416 rundll32.exe rundll32.exe PID 2416 wrote to memory of 2188 2416 rundll32.exe rundll32.exe PID 2416 wrote to memory of 2188 2416 rundll32.exe rundll32.exe PID 2416 wrote to memory of 2188 2416 rundll32.exe rundll32.exe PID 2188 wrote to memory of 1692 2188 rundll32.exe WerFault.exe PID 2188 wrote to memory of 1692 2188 rundll32.exe WerFault.exe PID 2188 wrote to memory of 1692 2188 rundll32.exe WerFault.exe PID 2188 wrote to memory of 1692 2188 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71354278675a4deea20fb3cbb5f77170_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71354278675a4deea20fb3cbb5f77170_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 2723⤵
- Program crash
PID:1692