Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 23:45

General

  • Target

    bfaf3ad900441cc43fc22e8d13b491f9_JaffaCakes118.dll

  • Size

    158KB

  • MD5

    bfaf3ad900441cc43fc22e8d13b491f9

  • SHA1

    51287e14de3dd6bb9c5ab4520c76c29bd9a14eb1

  • SHA256

    a1155e550722133b0063bfad413ff6bc7611ecc11e3e0629c68c3ad60c5836dd

  • SHA512

    344cd61f6a4698542afb1ac3936629192c0b441d8280b3499e90072644f3990f2775a4bcc4caa23b883826ec1371017a0cf07ccab45e0bd5a4b242bb2982ee3b

  • SSDEEP

    3072:rgztpy1ATC0T/Z/ml/ksuiSbFNBp6u1z6rJyaZDRIxJzqCQ4wcOY4AFpAzEW:Ez3y18Ck/Ml/ksDUNX6c6caZVqJ2CBXM

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\bfaf3ad900441cc43fc22e8d13b491f9_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\bfaf3ad900441cc43fc22e8d13b491f9_JaffaCakes118.dll
      2⤵
      • Server Software Component: Terminal Services DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      PID:2740
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k ufad-dns60
    1⤵
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2740-11-0x0000000000120000-0x0000000000143000-memory.dmp

    Filesize

    140KB

  • memory/2740-1-0x0000000000120000-0x0000000000143000-memory.dmp

    Filesize

    140KB

  • memory/2740-2-0x0000000000120000-0x0000000000143000-memory.dmp

    Filesize

    140KB

  • memory/2740-6-0x0000000010000000-0x0000000010048000-memory.dmp

    Filesize

    288KB

  • memory/2740-4-0x0000000010000000-0x0000000010048000-memory.dmp

    Filesize

    288KB

  • memory/2740-3-0x0000000010000000-0x0000000010048000-memory.dmp

    Filesize

    288KB

  • memory/2740-7-0x0000000010001000-0x000000001000A000-memory.dmp

    Filesize

    36KB

  • memory/2740-8-0x0000000010000000-0x0000000010048000-memory.dmp

    Filesize

    288KB

  • memory/2740-9-0x0000000010000000-0x0000000010048000-memory.dmp

    Filesize

    288KB

  • memory/2740-10-0x0000000000120000-0x0000000000143000-memory.dmp

    Filesize

    140KB

  • memory/2740-0-0x0000000010000000-0x0000000010048000-memory.dmp

    Filesize

    288KB

  • memory/2800-13-0x00000000000E0000-0x0000000000103000-memory.dmp

    Filesize

    140KB

  • memory/2800-12-0x0000000010000000-0x0000000010048000-memory.dmp

    Filesize

    288KB

  • memory/2800-16-0x0000000010000000-0x0000000010048000-memory.dmp

    Filesize

    288KB

  • memory/2800-14-0x0000000010000000-0x0000000010048000-memory.dmp

    Filesize

    288KB

  • memory/2800-20-0x0000000010000000-0x0000000010048000-memory.dmp

    Filesize

    288KB

  • memory/2800-19-0x0000000010000000-0x0000000010048000-memory.dmp

    Filesize

    288KB

  • memory/2800-18-0x0000000010000000-0x0000000010048000-memory.dmp

    Filesize

    288KB

  • memory/2800-15-0x0000000010000000-0x0000000010048000-memory.dmp

    Filesize

    288KB

  • memory/2800-21-0x0000000010000000-0x0000000010048000-memory.dmp

    Filesize

    288KB

  • memory/2800-22-0x0000000010000000-0x0000000010048000-memory.dmp

    Filesize

    288KB