Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
4c3bfa5b548f425c2f255043191e4840_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c3bfa5b548f425c2f255043191e4840_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4c3bfa5b548f425c2f255043191e4840_JaffaCakes118.dll
-
Size
211KB
-
MD5
4c3bfa5b548f425c2f255043191e4840
-
SHA1
0982b81652c5989af8a00b6d98e51fa3b23f9de8
-
SHA256
a68aae874771308e94afbff7513f937551dd408a40e893532d17ed128f5115c8
-
SHA512
12db424e3a0ac5eff7675034bc95e1282155729b139b31a686e1dd51be9727823c67ba836ffc71e28e36e246ada388ecc18928b617187f379a2c799342243424
-
SSDEEP
6144:O0iSAUYrlX7BBcDqowKv4ngY64VJr+H9Wds:O0iRUwrBBQCKwgYzVJfy
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\-53-78-103-32 rundll32.exe File created C:\Windows\SysWOW64\0b9 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2792 2760 rundll32.exe 31 PID 2760 wrote to memory of 2792 2760 rundll32.exe 31 PID 2760 wrote to memory of 2792 2760 rundll32.exe 31 PID 2760 wrote to memory of 2792 2760 rundll32.exe 31 PID 2760 wrote to memory of 2792 2760 rundll32.exe 31 PID 2760 wrote to memory of 2792 2760 rundll32.exe 31 PID 2760 wrote to memory of 2792 2760 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c3bfa5b548f425c2f255043191e4840_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c3bfa5b548f425c2f255043191e4840_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2792
-