Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
07dbae86c7d09c3af9ccd5cd0c21ea74_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
07dbae86c7d09c3af9ccd5cd0c21ea74_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
07dbae86c7d09c3af9ccd5cd0c21ea74_JaffaCakes118.exe
-
Size
24KB
-
MD5
07dbae86c7d09c3af9ccd5cd0c21ea74
-
SHA1
33fc0185eb2b8087cd520a34bc1428a7eced165e
-
SHA256
8b51d7e5444f4e08af0e4672e8932c575d58fb5c5b42803a3cc2b3411410b7cd
-
SHA512
e95d36a2c8ffcf21ea4550306257d36b0a4883f6cd0fc9fcf64aef069a7f2b75de62986b1e89e428be8559abc57c3508832a445a6fcbdf26743dcf6d7391b642
-
SSDEEP
384:DMsSBCJ4x7DAtof49PwYBTo6miPBCVZ68j1B3ZKn:wsrix7ctoeoniPqZ/JZZK
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 07dbae86c7d09c3af9ccd5cd0c21ea74_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF604EFE-8897-11D1-B944-00A0C90312E1}\InProcServer32\ 07dbae86c7d09c3af9ccd5cd0c21ea74_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2916 07dbae86c7d09c3af9ccd5cd0c21ea74_JaffaCakes118.exe