Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 06:33
Static task
static1
Behavioral task
behavioral1
Sample
24f5623a293da677a8eac9045a85f384_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
24f5623a293da677a8eac9045a85f384_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
24f5623a293da677a8eac9045a85f384_JaffaCakes118.exe
-
Size
186KB
-
MD5
24f5623a293da677a8eac9045a85f384
-
SHA1
5165e927421fbed4c4a50273dae0b3724c904af8
-
SHA256
722e76ac22a6a739c8e53344bc734afb67102136fecf3fd6acfd405421228ecd
-
SHA512
fedce89c8e8b991ac2f3d225f7728fa836fff2c6f2934454874e7c17fee08828860ef3601272cdb6a2fd5677328c97c00795302a9c91478dee6f32dbbaf20d42
-
SSDEEP
3072:YyfZmSVUaFPmgRMNlPTGQQm6ytwZEsrYkK46oqB:YyBl98gWNlPTGQQm6agrd6nB
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 24f5623a293da677a8eac9045a85f384_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2844 24f5623a293da677a8eac9045a85f384_JaffaCakes118.exe