Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
69ddf820259429c268f6f69e5ae414bb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69ddf820259429c268f6f69e5ae414bb_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
69ddf820259429c268f6f69e5ae414bb_JaffaCakes118.exe
-
Size
17.8MB
-
MD5
69ddf820259429c268f6f69e5ae414bb
-
SHA1
0cfe7e0c179ef80c5f639a6783f6a7c26470b0e5
-
SHA256
ca2065c3a709404baf45cec2c0f992f883b57abf24de9cbb2335f2abf5a93411
-
SHA512
2f99554c015afd943704b705b51ec007534976a5dea55ea7aa567f02a16a7669b047068a5640eabe1405926f4f5d351aaeffc28442a6050115813c619f2e4286
-
SSDEEP
393216:tleNOuGa8AgUDg0VpE3x8aFLLzMn3/a8jnHrIwXrkGaVwBe2:LeNOv36D43x8aFv43VbrkCE2
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 69ddf820259429c268f6f69e5ae414bb_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4400 69ddf820259429c268f6f69e5ae414bb_JaffaCakes118.exe 4400 69ddf820259429c268f6f69e5ae414bb_JaffaCakes118.exe 4400 69ddf820259429c268f6f69e5ae414bb_JaffaCakes118.exe 4400 69ddf820259429c268f6f69e5ae414bb_JaffaCakes118.exe 4400 69ddf820259429c268f6f69e5ae414bb_JaffaCakes118.exe 4400 69ddf820259429c268f6f69e5ae414bb_JaffaCakes118.exe