Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
647a76909c80296b718fb1c1beeb366f_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
647a76909c80296b718fb1c1beeb366f_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
647a76909c80296b718fb1c1beeb366f_JaffaCakes118.dll
-
Size
100KB
-
MD5
647a76909c80296b718fb1c1beeb366f
-
SHA1
2528f55de246dfc62e8d6cf6d809ec6cb2e35cc4
-
SHA256
88e3c4065add322771f0274edd319e967a4927342a8316d965f94dc5d00ad408
-
SHA512
351808542233c93bfe7904f29565630c59c04bcf0c19f4e2bf336d58b36c6d2a7466798d187e5f06ff185bc42fb4bb5dfbdb4b120529bbb0afcfe5814d492f28
-
SSDEEP
1536:v4d/Gv1Z67JTHTEylGhQQBFmEY5Mn+25SxOPHUYSjg4Y:vDMhGhQOFmEY5MU8PHUpc4Y
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 612 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2432 wrote to memory of 612 2432 rundll32.exe 29 PID 2432 wrote to memory of 612 2432 rundll32.exe 29 PID 2432 wrote to memory of 612 2432 rundll32.exe 29 PID 2432 wrote to memory of 612 2432 rundll32.exe 29 PID 2432 wrote to memory of 612 2432 rundll32.exe 29 PID 2432 wrote to memory of 612 2432 rundll32.exe 29 PID 2432 wrote to memory of 612 2432 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\647a76909c80296b718fb1c1beeb366f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\647a76909c80296b718fb1c1beeb366f_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:612
-