Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
d58c19e62ef7dad2eeda7328148998b7_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d58c19e62ef7dad2eeda7328148998b7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d58c19e62ef7dad2eeda7328148998b7_JaffaCakes118.dll
-
Size
376KB
-
MD5
d58c19e62ef7dad2eeda7328148998b7
-
SHA1
e8810b4f63e4ec73c27a424b2abfccfe7c39349a
-
SHA256
eeeb88321e863cdc82fcbce3137fda5e36fc8e68ae4b7e6365a07c02e40bf493
-
SHA512
ab8f4dd26d39eba9b0a2fd73658f72a169c4405b781d98bbc10bff5abcbf4b47e0f09841e6098a536cd5037105c5ac3d474e9ec546bf46f622eac079dabc4c97
-
SSDEEP
6144:8ozUum4+aOAdkQbYxIr2MLoMBU/dI6VyrgsUW07Z/4JlSXvCBGUH:8ozUum4gGkQbcIrJvu/dDVy/UX76XS+Z
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\-42-97101-15 rundll32.exe File created C:\Windows\SysWOW64\01a rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2900 2856 rundll32.exe 30 PID 2856 wrote to memory of 2900 2856 rundll32.exe 30 PID 2856 wrote to memory of 2900 2856 rundll32.exe 30 PID 2856 wrote to memory of 2900 2856 rundll32.exe 30 PID 2856 wrote to memory of 2900 2856 rundll32.exe 30 PID 2856 wrote to memory of 2900 2856 rundll32.exe 30 PID 2856 wrote to memory of 2900 2856 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d58c19e62ef7dad2eeda7328148998b7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d58c19e62ef7dad2eeda7328148998b7_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2900
-