Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 03:05
Static task
static1
Behavioral task
behavioral1
Sample
2ec857437436707e25ea14c321c51bd4_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2ec857437436707e25ea14c321c51bd4_JaffaCakes118.dll
Resource
win10v2004-20240708-en
General
-
Target
2ec857437436707e25ea14c321c51bd4_JaffaCakes118.dll
-
Size
92KB
-
MD5
2ec857437436707e25ea14c321c51bd4
-
SHA1
b6b43a3fe8d568e2edd4609a82843501f5b371fe
-
SHA256
49f7189657c0b3880d84a91ba68a086d014f921b2e6301b06ce7f3fd7da2a2cb
-
SHA512
46f92efa4caf3a616ef4ece85eb4231a232ccc889408950fd224de18ac8b2271cc292d4cc267a5e50c0afe73e1bb99357d09e5b9c52ef990de86f7f8ba413c93
-
SSDEEP
1536:ewXq9VD+fGPP7mxcihYN/6Wb++RC+Hmudt7dGttMVToBwCMHkFNudHGUf:9Xq9VSfG36cihE/fb//HX4EoBwCWkF4v
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2056 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1180 wrote to memory of 2056 1180 rundll32.exe 30 PID 1180 wrote to memory of 2056 1180 rundll32.exe 30 PID 1180 wrote to memory of 2056 1180 rundll32.exe 30 PID 1180 wrote to memory of 2056 1180 rundll32.exe 30 PID 1180 wrote to memory of 2056 1180 rundll32.exe 30 PID 1180 wrote to memory of 2056 1180 rundll32.exe 30 PID 1180 wrote to memory of 2056 1180 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ec857437436707e25ea14c321c51bd4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ec857437436707e25ea14c321c51bd4_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:2056
-