Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 12:03
Static task
static1
Behavioral task
behavioral1
Sample
a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
a099e55669d6f3eb4e479c5964ff9d7c
-
SHA1
97457fa1769b813a5222ce2458cb2a13372bd350
-
SHA256
624c53be8c56cffe5a4257b90a85dc7aed62e83820bdc22b9f5b9bd6d3cc30c7
-
SHA512
d30558f7249ab802aae7a285238ed60dd23df3083d23f9c7dd5da0b3e36726ea0d78a63bc52c2873ba902ba750fbe13361722d347812dd9352d88997f78f2c80
-
SSDEEP
49152:wpjR8r8r8GJUakG2QPUD2LjXEy6khz9yiUMBZk:uF8r8rrJUakG/PUSnEOhz9yiUMBZk
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exedescription ioc process File opened for modification \??\PhysicalDrive0 a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe -
Modifies registry class 11 IoCs
Processes:
a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idex = "ca94cbffe39f8b25a3d577cd03a89dd7" a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories\{607568DD-B059-434b-B7E7-38EC51998F8E} a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278} a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0} a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories\{607568DD-B059-434b-B7E7-38EC51998F8E}\did = "283B4E891A5B890A9CCBC6880A0B1FC3" a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idno = "1" a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exepid process 2184 a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe 2184 a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe 2184 a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exepid process 2184 a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe 2184 a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe 2184 a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a099e55669d6f3eb4e479c5964ff9d7c_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\install_res\installconfig.iniFilesize
85B
MD57c72580e2be2c14f434b7a731ed40baa
SHA13b391bed689cb9537a11e7dbe350aad6ec0036b6
SHA25685d04a317eef1c187b01caf280350c3daa1fd5f34c9cbb9826d253f58d83cc94
SHA51274a1665d16e1cfdaa8faa5b29cf45f74b528a284b71620947489e3408f9d11045243397b55c802d327fbd809efc50054e1c3d3c902616e285207d7c151fe1665
-
memory/2184-14-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB