Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 03:04

General

  • Target

    188ea7941fa192ced4b3e0d432c8eedb_JaffaCakes118.dll

  • Size

    676KB

  • MD5

    188ea7941fa192ced4b3e0d432c8eedb

  • SHA1

    d83cb02afe9fd7fa01b2a33bcbd9e5206a5dc797

  • SHA256

    de7dea9ede13286d4c5fc91e0938ab52e50f7902837b383f5de82b409aeed2e1

  • SHA512

    a601ca83bdef84e034e76bde6fb24a7afe777bc599bc4198f4e930ad9f73cbdebaa22615f015e3b55ecb7c081a8f70d10ff56612ec6930ea854fb37a49c9b3ae

  • SSDEEP

    12288:87LGfn+az6WllxKdVQm9ixSQpD3VS81jMGBxtsiY:87LG/+ajlAVjIxdpbA81YGBsiY

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\188ea7941fa192ced4b3e0d432c8eedb_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4140
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\188ea7941fa192ced4b3e0d432c8eedb_JaffaCakes118.dll,#1
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Drops file in System32 directory
      PID:3364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3364-0-0x0000000010000000-0x00000000100A7000-memory.dmp

    Filesize

    668KB