Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 03:34
Static task
static1
Behavioral task
behavioral1
Sample
fbd5b04c3979374aadb3586eb3dc873d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fbd5b04c3979374aadb3586eb3dc873d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fbd5b04c3979374aadb3586eb3dc873d_JaffaCakes118.exe
-
Size
210KB
-
MD5
fbd5b04c3979374aadb3586eb3dc873d
-
SHA1
b8fcf50e41efc23514b20ca795a5542360a88477
-
SHA256
8f141b6923d6a6c7cef98a72065fc619e99d510a13a3543b6344553313734d73
-
SHA512
403210460c62ecfb44819dfa5d2ae716bc9eeb203e6bf9737cbbee175433d70d38ecf4bc354c27fbf78e345d18444948b477d7f34b8744a98e6fb31781264e52
-
SSDEEP
6144:mebUhx57Dle98gWNlPTGQQm6agrdy2usEQu:m/DXNtTirdy2CT
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
fbd5b04c3979374aadb3586eb3dc873d_JaffaCakes118.exedescription ioc process File opened for modification \??\PhysicalDrive0 fbd5b04c3979374aadb3586eb3dc873d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
fbd5b04c3979374aadb3586eb3dc873d_JaffaCakes118.exepid process 1948 fbd5b04c3979374aadb3586eb3dc873d_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1948-1-0x0000000000460000-0x00000000004A3000-memory.dmpFilesize
268KB
-
memory/1948-0-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/1948-8-0x0000000000380000-0x0000000000381000-memory.dmpFilesize
4KB
-
memory/1948-7-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/1948-6-0x00000000004F0000-0x00000000004FA000-memory.dmpFilesize
40KB
-
memory/1948-5-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1948-3-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1948-2-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/1948-10-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/1948-11-0x0000000000460000-0x00000000004A3000-memory.dmpFilesize
268KB