Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 04:17
Static task
static1
Behavioral task
behavioral1
Sample
d10e99e27bc7b2492ec09af4a468ec61_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d10e99e27bc7b2492ec09af4a468ec61_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d10e99e27bc7b2492ec09af4a468ec61_JaffaCakes118.dll
-
Size
472KB
-
MD5
d10e99e27bc7b2492ec09af4a468ec61
-
SHA1
7c3a07797518bd02154f80ee650cfd238daf8aca
-
SHA256
1f626c17bc31d601d221a394c9c0c099990d166c5dea08312d62f745003bc0ea
-
SHA512
2f4e4b78fabc21fea66aaecc130433d84455de71e1ecd50f1cace3f22e267af41fd065cf9f47454cf583ceaf2c7969a273cc5901790842dd17b60fe7297d90f6
-
SSDEEP
12288:fJ0WxRB9mn1M5noURdBkdHgmW0nhfQCl6vkPSzgwdI:fJ9xR+qPvmBg6hLitG
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\-2952117-11 rundll32.exe File created C:\Windows\SysWOW64\076 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2084 2160 rundll32.exe 30 PID 2160 wrote to memory of 2084 2160 rundll32.exe 30 PID 2160 wrote to memory of 2084 2160 rundll32.exe 30 PID 2160 wrote to memory of 2084 2160 rundll32.exe 30 PID 2160 wrote to memory of 2084 2160 rundll32.exe 30 PID 2160 wrote to memory of 2084 2160 rundll32.exe 30 PID 2160 wrote to memory of 2084 2160 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d10e99e27bc7b2492ec09af4a468ec61_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d10e99e27bc7b2492ec09af4a468ec61_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2084
-