Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 09:30
Behavioral task
behavioral1
Sample
f0bd84d282ee2045db145c9d1fe676e6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f0bd84d282ee2045db145c9d1fe676e6_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f0bd84d282ee2045db145c9d1fe676e6_JaffaCakes118.exe
-
Size
954KB
-
MD5
f0bd84d282ee2045db145c9d1fe676e6
-
SHA1
5f584c511ea2a210f3d84498118c0e4f2cd8ee7f
-
SHA256
e029ec244d0d1cb0489101e1a696d4332c71d9dac65e5bf0446b6bc13a086dcd
-
SHA512
71b8eb0dced7cd8899fc34f89740175926d922c368cc64abc969dd21108bee3beac398ad08922f8676463eb3aca2d5221f5562d0f1f19edbf0e13457ce55cb44
-
SSDEEP
12288:0eCpfaIALlZF79BG1pdMrlSiUIiQADEaLCbHlN5rwq2dA8TtxmVa8pvrdM+2wnRv:LCpfcZ/c4aLqNdl21mVa8pjWAK3IB
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 f0bd84d282ee2045db145c9d1fe676e6_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2176 f0bd84d282ee2045db145c9d1fe676e6_JaffaCakes118.exe