Analysis
-
max time kernel
93s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
d26335a26a0c6946abe915647b155f75_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d26335a26a0c6946abe915647b155f75_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d26335a26a0c6946abe915647b155f75_JaffaCakes118.dll
-
Size
184KB
-
MD5
d26335a26a0c6946abe915647b155f75
-
SHA1
96f8cd2bd4d12ddaa148c7fb16cbb4484691b166
-
SHA256
ba6250a7c53791a725ad814d5a209a0253c1d3c28d962ec181d66a04c8ceb2cd
-
SHA512
afe0df2c82478e2706040a3d13cc745863f32704915a1aabf3e8af371e998b7cb8320b5870336fafe2213799108be6315e0f18d18ddd691891ffaa3b27e909dc
-
SSDEEP
3072:MFn3MLV+2XQ5b+S63Bzxc7Xs9chwc3xXtwRIcdMS01hQZIc05VibJ/RAMhZZC3Xo:MFn3MvXQ5Z63BEycMR1WhWIx5VGJ/3Zc
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 756 rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3128 756 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3124 wrote to memory of 756 3124 rundll32.exe 83 PID 3124 wrote to memory of 756 3124 rundll32.exe 83 PID 3124 wrote to memory of 756 3124 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d26335a26a0c6946abe915647b155f75_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d26335a26a0c6946abe915647b155f75_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 6243⤵
- Program crash
PID:3128
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 756 -ip 7561⤵PID:1152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD500d9cecbbd06138debbc8f98da01e1a1
SHA1926e4745e95dad351d28dcc789b21fa9682c2ced
SHA256bbbbe4e428de60fe59cc3501b8bf600bbbc132711fa7fe69457fb7bc5e7139fb
SHA512a6d668e70b0574bc451d01859d2b3f5c5e2c9e02c97ac753170538d5fddc3e1a76c9daade694832c151d1e100452e0af4c0e34021c4ac708d394f8150e40bffd