Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
03177f179628ff785ed13163c687746f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03177f179628ff785ed13163c687746f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
03177f179628ff785ed13163c687746f_JaffaCakes118.exe
-
Size
46KB
-
MD5
03177f179628ff785ed13163c687746f
-
SHA1
c2200fe095155e3d3de1c0d9afc45ee8fa884af3
-
SHA256
9a7482878947a8f22b3a04c693f28f988202b1f858b6761cceb0ed08108f16ac
-
SHA512
d0681015061d6c5f5829a14d7e96aa33f21c5055307eb1efd25fbcf55374ab2af3585a6d7ea369e21cbb69d935446511b30b9429182e959248df40da6df201c2
-
SSDEEP
768:glR1xJurBnnpRndABjnnFsglAvP/ybJPWRVfbObzVmr6oPL0pZj5CjqdbF:Chu9pYBnFswZA/DsADz0ptQja
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2904 avp.exe -
Loads dropped DLL 2 IoCs
pid Process 920 03177f179628ff785ed13163c687746f_JaffaCakes118.exe 920 03177f179628ff785ed13163c687746f_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 03177f179628ff785ed13163c687746f_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\tf2sound.dll 03177f179628ff785ed13163c687746f_JaffaCakes118.exe File created C:\Windows\SysWOW64\delplme.bat 03177f179628ff785ed13163c687746f_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\avp.exe 03177f179628ff785ed13163c687746f_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 920 03177f179628ff785ed13163c687746f_JaffaCakes118.exe 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 920 03177f179628ff785ed13163c687746f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 920 wrote to memory of 4752 920 03177f179628ff785ed13163c687746f_JaffaCakes118.exe 83 PID 920 wrote to memory of 4752 920 03177f179628ff785ed13163c687746f_JaffaCakes118.exe 83 PID 920 wrote to memory of 4752 920 03177f179628ff785ed13163c687746f_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\03177f179628ff785ed13163c687746f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03177f179628ff785ed13163c687746f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c delplme.bat2⤵PID:4752
-
-
C:\Windows\avp.exeC:\Windows\avp.exe1⤵
- Executes dropped EXE
PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306B
MD58bc6d4027b4d2bb55de8aff4dda28a17
SHA18a25e43523c0629e77b29beb2f6f4f55b082abdd
SHA25646406552e4da30bec28dd6781f2447f581314d57f14aa3a53da962b0e7f3f4db
SHA512b91e57b1fd70dc00dc471e209adf6aa776f2549c75c28bb0f111cc07fad08e50ada4a79c616c5da88f465bf662585b5a1c34315cfd0006c656ea4c50dae16745
-
Filesize
73KB
MD5300e3ef9591bf60a9dbbfda4f7ea8405
SHA18d51225f42064590f0e96a00f6087df6170ce73a
SHA2565fe1cd924e9bd5f956bd5c542b79107af5213d31b2c86c82d159b85fd1a60d5e
SHA512cc5cdc8298bdd6241e44fe45daa78792dd1e664aa198e1a5115f7b7fe98c6005cc9bba324162460c4a86fdb6351db62494a7ea3f52cc12d8720690de51a22d55
-
Filesize
34KB
MD5d6baf5b17cdbcbcf037f2f4afd8b5885
SHA111fb63fc5d0c8832df7b1afed904e9a0a6e14328
SHA25651255f37abb1e5c33a1616fadbe6f220bea1e1075839a43cd0c9b73a2dfe385d
SHA51254828597eb26bbce1175578cac9288cc905a8d449f5e4c40b8f6c083e6526bc00df72ef00beca7c3dbcc31c9930cc4f1fb528df2f1780c2d7c8ca6126734efd3