Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
6eede4f556e7d4584d7d8caf61eb31fa_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6eede4f556e7d4584d7d8caf61eb31fa_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6eede4f556e7d4584d7d8caf61eb31fa_JaffaCakes118.dll
-
Size
399KB
-
MD5
6eede4f556e7d4584d7d8caf61eb31fa
-
SHA1
6564ce83bf7229a0582976cab024d436719f6630
-
SHA256
1dbff5b29c12ce5344066ddc9ea47ba7623c295cb0bed7a3055a1d2e92820fbe
-
SHA512
64a3f5b0e9b0d843a250bd1473fc97dc5b54639c2e370379feea74cbcc65dcb42ba81904dd4b5be5fd088546da25b91a874810cf2ad722bf11d8481deb836329
-
SSDEEP
12288:Vj/TIz8QxVfkT5qv9Du8LlFro1rWJOji2FPpGd:Vj68KVcT5qvk8Llu1rWJOji4U
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\-7755-9238 rundll32.exe File created C:\Windows\SysWOW64\1b50 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1916 2972 rundll32.exe 30 PID 2972 wrote to memory of 1916 2972 rundll32.exe 30 PID 2972 wrote to memory of 1916 2972 rundll32.exe 30 PID 2972 wrote to memory of 1916 2972 rundll32.exe 30 PID 2972 wrote to memory of 1916 2972 rundll32.exe 30 PID 2972 wrote to memory of 1916 2972 rundll32.exe 30 PID 2972 wrote to memory of 1916 2972 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6eede4f556e7d4584d7d8caf61eb31fa_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6eede4f556e7d4584d7d8caf61eb31fa_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1916
-