Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 22:16
Static task
static1
Behavioral task
behavioral1
Sample
b573d4d0f077ef9cc625baf2a3054638_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b573d4d0f077ef9cc625baf2a3054638_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
b573d4d0f077ef9cc625baf2a3054638_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
b573d4d0f077ef9cc625baf2a3054638
-
SHA1
a0b02f8726c7d5d4bf740b846b6b0e39488ecf4e
-
SHA256
c092bf3038b99cd9d5b4a7bea08358f4df941c240f1b57995068014ab418250a
-
SHA512
69203f2bfbb3d70500579ac9992f9ec79385a9484a67457f87c97fc1ce43c5f646cbc32c9c4832a634cc4d5bd7f249dc78e78f1534b4d0d41302e61d6a992647
-
SSDEEP
24576:v7VWwEOTIjuCLp2auHLPZjpDNYm0HIidJJKC2Fj5E5v7CKv:v7VJEICwMTlKd8
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
b573d4d0f077ef9cc625baf2a3054638_JaffaCakes118.exedescription ioc process File opened for modification \??\PhysicalDrive0 b573d4d0f077ef9cc625baf2a3054638_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4364 1904 WerFault.exe b573d4d0f077ef9cc625baf2a3054638_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
b573d4d0f077ef9cc625baf2a3054638_JaffaCakes118.exepid process 1904 b573d4d0f077ef9cc625baf2a3054638_JaffaCakes118.exe 1904 b573d4d0f077ef9cc625baf2a3054638_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b573d4d0f077ef9cc625baf2a3054638_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b573d4d0f077ef9cc625baf2a3054638_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:1904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 19202⤵
- Program crash
PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1904 -ip 19041⤵PID:2592