Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 03:07
Static task
static1
Behavioral task
behavioral1
Sample
f7208a5e64ac38380ff4a913bbe538e9_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f7208a5e64ac38380ff4a913bbe538e9_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f7208a5e64ac38380ff4a913bbe538e9_JaffaCakes118.exe
-
Size
233KB
-
MD5
f7208a5e64ac38380ff4a913bbe538e9
-
SHA1
3ad8a818d36b8e47aff703fc01cbdd526b8af2ab
-
SHA256
675ca45809af2ffabe49ad0ce312c605c6aaa8c2ab0b166b8fc068d3959fccac
-
SHA512
7e2db66b367bd3eeade282e3030fe899c286431b52c56afad80b9c71009446ebbaecb27a5f496ce4316ea68b745eb8147d75a53d51399b2df4235a239e97e448
-
SSDEEP
6144:VOuiDaBuna+x7598gWNlPTGQQm6agrdJv:jiDad+toNtTirdJv
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 f7208a5e64ac38380ff4a913bbe538e9_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1900 f7208a5e64ac38380ff4a913bbe538e9_JaffaCakes118.exe