Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 11:58

General

  • Target

    3904de0b43c9fdd728646c79a52c6d18_JaffaCakes118.dll

  • Size

    55KB

  • MD5

    3904de0b43c9fdd728646c79a52c6d18

  • SHA1

    76d0190dc432015cd095470a2efc659cc69387c3

  • SHA256

    ff776a93ec37dc4217a7778f19ddd3e3775767d4b364c9c0a2367d23b6af4c69

  • SHA512

    37cec2104dbfc2e17b92ca4782a7e7e3058f63dadf222b3f2b66f90ead5a3077eb766fbfef0ba9568b217373567e3b64ec16f56d8086d0c937ccd16889aa3118

  • SSDEEP

    1536:mS/USJwUkmEocPG4nU1VuKOX08FIZHszmJE:noLocPG4UCVX0dZMF

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3904de0b43c9fdd728646c79a52c6d18_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3904de0b43c9fdd728646c79a52c6d18_JaffaCakes118.dll,#1
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious behavior: EnumeratesProcesses
      PID:2360

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2360-0-0x00000000001B0000-0x00000000001B9000-memory.dmp

          Filesize

          36KB

        • memory/2360-3-0x00000000001B0000-0x00000000001B9000-memory.dmp

          Filesize

          36KB