Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
3e1457b41624442d6fc46907ad4e4c1a_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e1457b41624442d6fc46907ad4e4c1a_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3e1457b41624442d6fc46907ad4e4c1a_JaffaCakes118.dll
-
Size
484KB
-
MD5
3e1457b41624442d6fc46907ad4e4c1a
-
SHA1
6477dca9262561f5b155f2c855f24931b4dc16fc
-
SHA256
e6b009d1a05521b2d668f2d57abe42a53cc8ee62fe4757bbbeea3a0a0e79bd95
-
SHA512
3ee73657a6280dc3e1f86a7832d486fd7d07792be0a53fc9d33609e34ada6c3545f059aa3c831a4b4fe5f770d5a2d1e487b3752b7ac71c5bacf2ac9659f4ee34
-
SSDEEP
12288:khJV678QWl0r1kZR08QuEd6ScBNLXbpAAlRXqccxiJi:khr674lhDQFcBRXKIRXq/xoi
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\12-127-3756 rundll32.exe File created C:\Windows\SysWOW64\02e83 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2476 2452 rundll32.exe 30 PID 2452 wrote to memory of 2476 2452 rundll32.exe 30 PID 2452 wrote to memory of 2476 2452 rundll32.exe 30 PID 2452 wrote to memory of 2476 2452 rundll32.exe 30 PID 2452 wrote to memory of 2476 2452 rundll32.exe 30 PID 2452 wrote to memory of 2476 2452 rundll32.exe 30 PID 2452 wrote to memory of 2476 2452 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e1457b41624442d6fc46907ad4e4c1a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e1457b41624442d6fc46907ad4e4c1a_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2476
-