Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
5a8fd1c737d2c13ec72f9b6754e888c9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a8fd1c737d2c13ec72f9b6754e888c9_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5a8fd1c737d2c13ec72f9b6754e888c9_JaffaCakes118.dll
-
Size
40KB
-
MD5
5a8fd1c737d2c13ec72f9b6754e888c9
-
SHA1
481df0d3aaafef9ee49133b24dd2cb6d29734e1f
-
SHA256
c41e2b90a4399ba3acc080209773efa22f75c3b81349d1c8dbdc1d7442efc829
-
SHA512
8057e6be6af279a63c6605853526497d1cf6fd50a807cfc142a3f20792adf9d64725dff47868d4631f73cb43b8203f06129c87078656feb66b659278148891c6
-
SSDEEP
768:Q35yKut93kAQX3TECskY5tAVlWGIfdxBcUL5Xn26Vs7zgD8FvxTFq:Q3IKzXzJskY5tFG+x0NIDQxM
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\linkinfo.dll1599225878 rundll32.exe File created C:\Windows\linkinfo.dll rundll32.exe File created C:\Windows\twain_86.dll rundll32.exe File opened for modification C:\Windows\clbcatq.dll352676458 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2144 2168 rundll32.exe 31 PID 2168 wrote to memory of 2144 2168 rundll32.exe 31 PID 2168 wrote to memory of 2144 2168 rundll32.exe 31 PID 2168 wrote to memory of 2144 2168 rundll32.exe 31 PID 2168 wrote to memory of 2144 2168 rundll32.exe 31 PID 2168 wrote to memory of 2144 2168 rundll32.exe 31 PID 2168 wrote to memory of 2144 2168 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5a8fd1c737d2c13ec72f9b6754e888c9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5a8fd1c737d2c13ec72f9b6754e888c9_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
PID:2144
-