Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
c8bf39ab87a340a9a6bb1e8d0744afae_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c8bf39ab87a340a9a6bb1e8d0744afae_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c8bf39ab87a340a9a6bb1e8d0744afae_JaffaCakes118.dll
-
Size
466KB
-
MD5
c8bf39ab87a340a9a6bb1e8d0744afae
-
SHA1
b7ee60cc108efb0598e52376a177f42e12e0ff7e
-
SHA256
f603d1032fb895d4c30820947a38c1222a64dc4ea41d2d5008d2e6c2af804acd
-
SHA512
6a0a33dc51fd3cf09514380b7bff83983ae98329bee84bfc20985179d44fafa3ba2d9ce5eed26d1e8d00f8101a1607b198c3fe9c57a8dd27eabdef880b97d5bf
-
SSDEEP
12288:ZxxUSrr2Y2UwAzdWqnJ7nyF48x1aB5shUJ0XCh17:ZxuY2HAxWuxyb7aB5IUJnh17
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\4-10312-105 rundll32.exe File created C:\Windows\SysWOW64\031 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1584 2244 rundll32.exe 30 PID 2244 wrote to memory of 1584 2244 rundll32.exe 30 PID 2244 wrote to memory of 1584 2244 rundll32.exe 30 PID 2244 wrote to memory of 1584 2244 rundll32.exe 30 PID 2244 wrote to memory of 1584 2244 rundll32.exe 30 PID 2244 wrote to memory of 1584 2244 rundll32.exe 30 PID 2244 wrote to memory of 1584 2244 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8bf39ab87a340a9a6bb1e8d0744afae_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8bf39ab87a340a9a6bb1e8d0744afae_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1584
-