Analysis

  • max time kernel
    148s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 16:32

General

  • Target

    3e1457b41624442d6fc46907ad4e4c1a_JaffaCakes118.dll

  • Size

    484KB

  • MD5

    3e1457b41624442d6fc46907ad4e4c1a

  • SHA1

    6477dca9262561f5b155f2c855f24931b4dc16fc

  • SHA256

    e6b009d1a05521b2d668f2d57abe42a53cc8ee62fe4757bbbeea3a0a0e79bd95

  • SHA512

    3ee73657a6280dc3e1f86a7832d486fd7d07792be0a53fc9d33609e34ada6c3545f059aa3c831a4b4fe5f770d5a2d1e487b3752b7ac71c5bacf2ac9659f4ee34

  • SSDEEP

    12288:khJV678QWl0r1kZR08QuEd6ScBNLXbpAAlRXqccxiJi:khr674lhDQFcBRXKIRXq/xoi

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3e1457b41624442d6fc46907ad4e4c1a_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3e1457b41624442d6fc46907ad4e4c1a_JaffaCakes118.dll,#1
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Drops file in System32 directory
      PID:2476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads