Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 17:00
Behavioral task
behavioral1
Sample
a77c4a15f1ef30971093733f8954511d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a77c4a15f1ef30971093733f8954511d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a77c4a15f1ef30971093733f8954511d_JaffaCakes118.dll
-
Size
541KB
-
MD5
a77c4a15f1ef30971093733f8954511d
-
SHA1
66fd178668cf833cf18d90002288a26b75233ec5
-
SHA256
27d6c592f2ef7ef62f506575d3ed233e104e79294ab95895a90f8761b68b33d8
-
SHA512
67f9c71f4c2e90701930fa36756b66a0293f85c4a2e3e90f5fc2883b92929bd7d9e6185f6a041dc1920d02a92f0652d398c160dee6d4f7dcace93cf5237b7c23
-
SSDEEP
12288:3ANJ9pMer74+KtfJbVb0KOdLet8a9lPmsAa6b7MP+Dd2c8iR:3KJ9pS+Ktf2dLa8MlP7A77MP+h2HiR
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3052 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 900 wrote to memory of 3052 900 rundll32.exe 30 PID 900 wrote to memory of 3052 900 rundll32.exe 30 PID 900 wrote to memory of 3052 900 rundll32.exe 30 PID 900 wrote to memory of 3052 900 rundll32.exe 30 PID 900 wrote to memory of 3052 900 rundll32.exe 30 PID 900 wrote to memory of 3052 900 rundll32.exe 30 PID 900 wrote to memory of 3052 900 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a77c4a15f1ef30971093733f8954511d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a77c4a15f1ef30971093733f8954511d_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3052
-