Analysis
-
max time kernel
31s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
ff7610c6bd197836fe627c73868f1d3c_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ff7610c6bd197836fe627c73868f1d3c_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff7610c6bd197836fe627c73868f1d3c_JaffaCakes118.exe
-
Size
173KB
-
MD5
ff7610c6bd197836fe627c73868f1d3c
-
SHA1
37c2d09aeb4ab1ebbcf783e66b8a0d63e51a8873
-
SHA256
7860c0a2ee26fe52950b261176fe6268444f36d634aefb432cb4f97a3685dcb6
-
SHA512
c650ec4498bc190a80a25c7d86947526335acb62b2ef1babc27f3c0ee3144e98e3274e0fc0d82f6d7c83abb66bab38cd27d661e42bfb3585b1ad7c80ac1f52c6
-
SSDEEP
3072:SqZLBRcAWHQjvN6gvrYaYhty4DjC7enN8AAFabdRZXROTuoHcZVT:7RBRFWw6gvMRhdDjC70ambjZYTuWi
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 ff7610c6bd197836fe627c73868f1d3c_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1888 ff7610c6bd197836fe627c73868f1d3c_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1888 ff7610c6bd197836fe627c73868f1d3c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1888 ff7610c6bd197836fe627c73868f1d3c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff7610c6bd197836fe627c73868f1d3c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff7610c6bd197836fe627c73868f1d3c_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:1888