Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
5a8fd1c737d2c13ec72f9b6754e888c9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a8fd1c737d2c13ec72f9b6754e888c9_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5a8fd1c737d2c13ec72f9b6754e888c9_JaffaCakes118.dll
-
Size
40KB
-
MD5
5a8fd1c737d2c13ec72f9b6754e888c9
-
SHA1
481df0d3aaafef9ee49133b24dd2cb6d29734e1f
-
SHA256
c41e2b90a4399ba3acc080209773efa22f75c3b81349d1c8dbdc1d7442efc829
-
SHA512
8057e6be6af279a63c6605853526497d1cf6fd50a807cfc142a3f20792adf9d64725dff47868d4631f73cb43b8203f06129c87078656feb66b659278148891c6
-
SSDEEP
768:Q35yKut93kAQX3TECskY5tAVlWGIfdxBcUL5Xn26Vs7zgD8FvxTFq:Q3IKzXzJskY5tFG+x0NIDQxM
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\linkinfo.dll rundll32.exe File created C:\Windows\twain_86.dll rundll32.exe File opened for modification C:\Windows\clbcatq.dll959167617 rundll32.exe File opened for modification C:\Windows\linkinfo.dll454653063 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2956 wrote to memory of 4792 2956 rundll32.exe 83 PID 2956 wrote to memory of 4792 2956 rundll32.exe 83 PID 2956 wrote to memory of 4792 2956 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5a8fd1c737d2c13ec72f9b6754e888c9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5a8fd1c737d2c13ec72f9b6754e888c9_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
PID:4792
-