Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 17:40
Behavioral task
behavioral1
Sample
eba1837e669c5184533c2f2c17948765_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eba1837e669c5184533c2f2c17948765_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
eba1837e669c5184533c2f2c17948765_JaffaCakes118.exe
-
Size
126KB
-
MD5
eba1837e669c5184533c2f2c17948765
-
SHA1
e8767838952f8e8f5b1d65f3ef541e7aa532aaf2
-
SHA256
70eaf8a884d8fe3175fb9f0422127b765ca1410f296939743f4c3e4a96f29f73
-
SHA512
ac57bf7447845d72200192a8202b10fe16412a98f7c410ecb0c3ef5dd7f5d8ade1e80a394496af309b60849eb42781d59ebabc2504f2d4fe3538ad13e9178fbc
-
SSDEEP
3072:b2Aj7dhKcwybItNGgY4/5GfVxRgdL421BV8hKlkoO8out3:b24CcwQItoSGfVrgdLrzChwkoNoS
Malware Config
Signatures
-
Drops file in Drivers directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\os7cyy07.sys eba1837e669c5184533c2f2c17948765_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\os7cyy07.sys eba1837e669c5184533c2f2c17948765_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers\bvk1yqus.sys eba1837e669c5184533c2f2c17948765_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\bvk1yqus.sys eba1837e669c5184533c2f2c17948765_JaffaCakes118.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\bvk1yqus\ImagePath = "system32\\drivers\\bvk1yqus.sys" eba1837e669c5184533c2f2c17948765_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\os7cyy07\ImagePath = "system32\\drivers\\os7cyy07.sys" eba1837e669c5184533c2f2c17948765_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2748-0-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/2748-4-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/2748-10-0x0000000000400000-0x0000000000449000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\gdno.dll eba1837e669c5184533c2f2c17948765_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\gdno.dll eba1837e669c5184533c2f2c17948765_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 464 Process not Found 464 Process not Found