Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 09:19
Behavioral task
behavioral1
Sample
256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe
-
Size
202KB
-
MD5
256c81ca64cb04c955eb55d9b1dc94d7
-
SHA1
44eece5bf5d8687dbcf94cee79668c9c261df7cf
-
SHA256
1b6da20bb366ba6d24062d100fe89fc4a236e774829383d01c3e0fec9ded67e8
-
SHA512
e33795a783ae371d13b1855c28572fc6a82460f6f573f1ea990230899e5892b4774ca398f69d0f6649726422d2fec516c60b21fce21a01f38935ea916c9c6760
-
SSDEEP
3072:juxYhpIkxhwuT+vS5s+2x06Hk7BbiRzmGT7zgjiCHpTd5SPrncxi84rJYJjdr9H:j0YhjwuTT396HSjGT7UZ5SPzcxt4F6rR
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2380-0-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2380-11-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2380-12-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2380-17-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2380-22-0x0000000000400000-0x0000000000477000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\i: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\n: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\o: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\u: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\y: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\j: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\p: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\q: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\s: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\v: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\k: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\r: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\w: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\z: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\x: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\e: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\g: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\h: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\l: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\m: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe File opened (read-only) \??\t: 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\SAItest.txt 256c81ca64cb04c955eb55d9b1dc94d7_JaffaCakes118.exe