Analysis
-
max time kernel
6s -
max time network
10s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 04:30
Static task
static1
Behavioral task
behavioral1
Sample
18c7e5fbfb5b0bdd09279e3bd8bd17f0_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
18c7e5fbfb5b0bdd09279e3bd8bd17f0_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Errors
General
-
Target
18c7e5fbfb5b0bdd09279e3bd8bd17f0_JaffaCakes118.dll
-
Size
1.7MB
-
MD5
18c7e5fbfb5b0bdd09279e3bd8bd17f0
-
SHA1
15b80b8a4b263f8a4b902dc1f6af01b923032e0e
-
SHA256
2cd91ceff31309f8dbdef3e2ef66cd20a6df6d910f9a4c98b3d7a9e67aada436
-
SHA512
29efa3df1eb2046e8662e29ef409cb6e7b6e7e3590aa9e9ee2d844e7faad3dd7302bd0c1627d4512faffccf53b446c3e82eb49b15ee14cc0a46fff8fdda1aaa6
-
SSDEEP
49152:W3T+vr7klhTd2UJA0MfsPGrBnY0Llmh71Is9M:8yv/klR2fsPG1nDl271G
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Wine rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2416 shutdown.exe Token: SeRemoteShutdownPrivilege 2416 shutdown.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1784 wrote to memory of 2920 1784 rundll32.exe 28 PID 1784 wrote to memory of 2920 1784 rundll32.exe 28 PID 1784 wrote to memory of 2920 1784 rundll32.exe 28 PID 1784 wrote to memory of 2920 1784 rundll32.exe 28 PID 1784 wrote to memory of 2920 1784 rundll32.exe 28 PID 1784 wrote to memory of 2920 1784 rundll32.exe 28 PID 1784 wrote to memory of 2920 1784 rundll32.exe 28 PID 2920 wrote to memory of 2416 2920 rundll32.exe 29 PID 2920 wrote to memory of 2416 2920 rundll32.exe 29 PID 2920 wrote to memory of 2416 2920 rundll32.exe 29 PID 2920 wrote to memory of 2416 2920 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18c7e5fbfb5b0bdd09279e3bd8bd17f0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18c7e5fbfb5b0bdd09279e3bd8bd17f0_JaffaCakes118.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" -s -t 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2664
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2644