Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 14:50
Static task
static1
Behavioral task
behavioral1
Sample
fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
fa89f8791dfaf4ab8ef219bffd508b8e
-
SHA1
091ac74284449d935cbd690813698f595bcb9977
-
SHA256
5078e7fe9f4608b1c09410fb28481ec5902100001408f3c7ede010861dfee0d3
-
SHA512
ca7e025c71223154260f19a15ae0e18a18d1836486a573737fae12a45168a6b455246e3dd0cd8cb96ffa4eec260e98574109d27c4cf05f17c5810671dad8438e
-
SSDEEP
24576:r/oM8SLYWNInsMfnDOm6iFv2VTBVVF/Nq5R7sy:zD8SLYW6np/DOm6VVT//Nk9n
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exedescription ioc process File opened for modification \??\PhysicalDrive0 fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
NFWCHK.exepid process 3008 NFWCHK.exe -
Loads dropped DLL 1 IoCs
Processes:
fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exepid process 2120 fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exe -
Processes:
fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exepid process 2120 fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exe 2120 fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exedescription pid process target process PID 2120 wrote to memory of 3008 2120 fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exe NFWCHK.exe PID 2120 wrote to memory of 3008 2120 fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exe NFWCHK.exe PID 2120 wrote to memory of 3008 2120 fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exe NFWCHK.exe PID 2120 wrote to memory of 3008 2120 fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exe NFWCHK.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa89f8791dfaf4ab8ef219bffd508b8e_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Public\Documents\Wondershare\NFWCHK.exeC:\Users\Public\Documents\Wondershare\NFWCHK.exe2⤵
- Executes dropped EXE
PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\wsWAE.logFilesize
4KB
MD53ff088d35facfd10a8933bc8786ee7de
SHA12a02c21317c5f9ea7949f9ba5e791984ec2a7b14
SHA2567395f01fff08e3c4a1f8258a92c1b467b519cbbc48ad99084e0430b12b696855
SHA5128284f021055fa3389d8d23708e1ea773ba9090a287e37d5f4778a88e54eb8610097a9e6b5d34d9fb31dfbf8735bd58660dd19b82658fd1afbdf5ca76b99741d6
-
C:\Users\Admin\AppData\Local\Temp\wsWAE.logFilesize
548B
MD5bbb81fe9d7c24128b9ff7316cb636c64
SHA142347d41eb66c26b50c1a91000fbd500d82e63a2
SHA25611fd5f89cecfb117c1468800a304ece564be5b2f50dc5ecef809c37af63846b7
SHA51222c3d6223fa5b46841381706252791809a9426661e02cb2d4073123e7c658bd40bd8f10b06b4ba4cd19107d4cec2c0a33b2d6a4ba1a60cb6987e8ffabd87435f
-
C:\Users\Admin\AppData\Local\Temp\wsWAE.logFilesize
1KB
MD52db67f4b002c99f2d89b8da4df94b18c
SHA138da729ef40f2ce1af33889ebadb66ef59ce7b44
SHA25603a7e29b49130952d6b7cfedc45e9f8a4a409ec48996cce85443751dce1a0158
SHA51254f05b6dca0bc69dc03611bec0991c83ab9f51303c2b64bed03db1f6afc89e094e67f21fe68641fb4be09d5d6169e5206cc1cb73c3507ca5d338e43536341bd1
-
C:\Users\Admin\AppData\Local\Temp\wsWAE.logFilesize
2KB
MD580a76fa0ebf4422d29768bb4066ba38e
SHA1a21c57bd309b865610c1a119bb5f3ebc6fcbe7b9
SHA256fbfa8bbc8a1bebcaa6796a8ef8953bda0e552132af66f1840bec34f46bec911d
SHA5120e72300bc6b5db9de7e76653d4503ebbe413f9d13d174abba13b55479e13338d8d4d8200692628d016d5dfa38447011808823e5693c34188a2fc110a3a76e05a
-
C:\Users\Admin\AppData\Local\Temp\wsduilib.logFilesize
1KB
MD529c673a993ed569f6b187e61c85a5aec
SHA1eae2b18c3d8416f6602b9ef592a332832e62f488
SHA2562168be78f08a2e0d4aa9d99ac4648bacad3f0753136dc20142688307d43da1b4
SHA512e4f3c61594ac729ad49f64894c5657ea864b5492d24f5197a63c615fedfbe28a1b1407d4a6d20714ee24711629de2040c6bc9d000c41e015f67f424ad7100556
-
C:\Users\Admin\AppData\Local\Temp\wsduilib.logFilesize
5KB
MD5f904a0dec286985d92dbc5e75fcb786a
SHA1c37f185c2bb4f9aa3cda40390719ac45db99b3d4
SHA256185dbc18314eb4650a01473266052fe1ae4890e96247308a97397a5fb9411ec4
SHA512f377ce52ec7f8d9800fb6c4fa0790ad493688a26d6d5cfcba91d719e9f3eb69333bf59e1f359d80aa8b4a8fa50326d670bb1d3bc737f1b17fc6f437f40e5be02
-
C:\Users\Public\Documents\Wondershare\NFWCHK.exeFilesize
7KB
MD527cfb3990872caa5930fa69d57aefe7b
SHA15e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f
SHA25643881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146
SHA512a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a
-
C:\Users\Public\Documents\Wondershare\NFWCHK.exe.configFilesize
229B
MD5ad0967a0ab95aa7d71b3dc92b71b8f7a
SHA1ed63f517e32094c07a2c5b664ed1cab412233ab5
SHA2569c1212bc648a2533b53a2d0afcec518846d97630afb013742a9622f0df7b04fc
SHA51285766a907331f60044ec205cf345453fc3d44bfcac296ac93a12e8a752b84290dfd94f73b71de82f46f9503177d29602cbb87549f89dc61373d889b4ea26634b
-
memory/3008-1084-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmpFilesize
9.6MB
-
memory/3008-1085-0x0000000002190000-0x0000000002210000-memory.dmpFilesize
512KB
-
memory/3008-1087-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmpFilesize
9.6MB