Analysis
-
max time kernel
138s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe
-
Size
437KB
-
MD5
74e2fe5deb763c58d212a7efd3f3001c
-
SHA1
d1fb691247be072f169ea142f49dded06c6e4520
-
SHA256
82b17a7aed76e271cc5d26627eb84a998657903bac5f6ba1c109e11df9bf7aa1
-
SHA512
06dd6ad9633477b3906d1190c273592b17e19e105bce72e3b9472a7bfc05e31bf2eaa77e8d3206d707251bc1ee068b03ad754dbff160448e0839e412d1b3ed61
-
SSDEEP
6144:RSrUuHX7jBQj61e0Jz6H119A1/DXg/SwvZRQKwARuS:RmpL1Qj61e0ASDXg/SwZRhRuS
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\v: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\y: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\m: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\n: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\o: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\r: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\t: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\u: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\e: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\h: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\l: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\p: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\i: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\s: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\w: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\z: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\x: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\g: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\j: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\k: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe File opened (read-only) \??\q: 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\74e2fe5deb763c58d212a7efd3f3001c_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
PID:2260
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3996 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:5512