Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    21-04-2024 16:57

General

  • Target

    ffbf4abd03dc885ad954ef045df79509_JaffaCakes118.exe

  • Size

    120KB

  • MD5

    ffbf4abd03dc885ad954ef045df79509

  • SHA1

    f5fe3f0a926c8662c7396aace74caad815f6131c

  • SHA256

    dcae93c2cb02cad5456572acd4394de059263674b684b0de200a921139e8607a

  • SHA512

    6278789de47c18bd9565eceb743e788608cbca9bb03b652e356684898737b7025f9572312be7175e9f9ccdd448b4a498232c32a74002b25d0c83a82eb1b82f0c

  • SSDEEP

    1536:y/XL8/csjgrmSz4GNy53AW+NLa9KXFMFYRAHQsePL3nP2KEfX2jX2LZyhI:yoBgakNO3gs9KXFhety3uKIX2jX2L/

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 3 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffbf4abd03dc885ad954ef045df79509_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ffbf4abd03dc885ad954ef045df79509_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 324
      2⤵
      • Program crash
      PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads