Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
b36e7bc1a8d75a1d5653f19ffbddcb6f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b36e7bc1a8d75a1d5653f19ffbddcb6f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b36e7bc1a8d75a1d5653f19ffbddcb6f_JaffaCakes118.dll
-
Size
472KB
-
MD5
b36e7bc1a8d75a1d5653f19ffbddcb6f
-
SHA1
8b100b7c687704d2e98ac1ac3f04e582e47a3e2b
-
SHA256
eab78c012b6fbec611682974f2aa909e289576025c34ff49b537d14dd62972dd
-
SHA512
c152406fb38810b0141cfe9a8864492617827c2613f5eac21c5ed5680915146863395e548689213f7469f6ce9f739dbe4f2852456b5832302bcb630c2050c995
-
SSDEEP
12288:rJ0Ox5RATSJ85aC0JSxkd2oOJ0OMaoCN6PSX/1mc4d1:rJlx5Oa1k24ooMqHmci
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\103 rundll32.exe File created C:\Windows\SysWOW64\6964299 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2928 2908 rundll32.exe 84 PID 2908 wrote to memory of 2928 2908 rundll32.exe 84 PID 2908 wrote to memory of 2928 2908 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b36e7bc1a8d75a1d5653f19ffbddcb6f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b36e7bc1a8d75a1d5653f19ffbddcb6f_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2928
-