Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 03:34
Static task
static1
Behavioral task
behavioral1
Sample
b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe
-
Size
509KB
-
MD5
b68fa901217f4bb20f8b9e3f1b887fe3
-
SHA1
856aa334b381eea13c37e8132d2877a29ed1a733
-
SHA256
f519dda63c36c0dca28973d8623527af2bc8825336c8e0eb78c45829e361ecfd
-
SHA512
4e74b18cc6b0e232533f52a7e507e8f6661736b6e09ae690890da509e9ba344d63419430f185702bde842d9ec700af95174bea3b97beb1d7cb528975030b10ab
-
SSDEEP
12288:sZSayd0ipruR8qjP1FFFOOzhEYkRd7Onb:sZ2prunLXFFO1R5qb
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\j: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\p: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\q: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\e: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\l: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\u: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\y: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\z: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\k: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\n: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\s: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\t: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\x: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\g: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\h: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\i: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\m: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\o: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\r: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\v: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe File opened (read-only) \??\w: b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 b68fa901217f4bb20f8b9e3f1b887fe3_JaffaCakes118.exe