Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-07-2024 14:16

General

  • Target

    2caa6c064b558c77571aaf44ebd90edf_JaffaCakes118.exe

  • Size

    298KB

  • MD5

    2caa6c064b558c77571aaf44ebd90edf

  • SHA1

    9f765d7359481b678eb7c588392c08786ec72558

  • SHA256

    00a290460af0c1b3050c96e3f52b0f7ed4fd8e515ac5255a66f415b58b455ddd

  • SHA512

    d6a31d6d6fd7ae004965d2aab68e772f81270721e64f7cdab883b88b5b437e866d16f48b5172aae29c6549d4a08fb5416e2eaa85a984b7b6fe3e84a1200ad906

  • SSDEEP

    6144:TCFykMHajHCH3vvOQaBWjRS9nVW5GJZ2tNYLj8MfsZooE6q:TCFypHgHCXvvOfrVzYKj86s0L

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\2caa6c064b558c77571aaf44ebd90edf_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\2caa6c064b558c77571aaf44ebd90edf_JaffaCakes118.exe"
        2⤵
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of SetThreadContext
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2980
        • C:\Users\Admin\AppData\Local\Temp\2caa6c064b558c77571aaf44ebd90edf_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\2caa6c064b558c77571aaf44ebd90edf_JaffaCakes118.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3052

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1200-40-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/2980-8-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-18-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-19-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-0-0x0000000000400000-0x00000000004C1000-memory.dmp

      Filesize

      772KB

    • memory/2980-17-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-7-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-15-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-14-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-25-0x00000000003C0000-0x00000000003C1000-memory.dmp

      Filesize

      4KB

    • memory/2980-24-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-23-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-22-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-13-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-12-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-11-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-10-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-21-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-20-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-16-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-6-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-5-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-4-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-3-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-2-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-1-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-26-0x0000000000400000-0x00000000004C1000-memory.dmp

      Filesize

      772KB

    • memory/2980-27-0x0000000000550000-0x0000000000551000-memory.dmp

      Filesize

      4KB

    • memory/2980-30-0x0000000000401000-0x0000000000438000-memory.dmp

      Filesize

      220KB

    • memory/2980-9-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/2980-37-0x0000000000400000-0x00000000004C1000-memory.dmp

      Filesize

      772KB

    • memory/2980-32-0x0000000003800000-0x00000000038C1000-memory.dmp

      Filesize

      772KB

    • memory/3052-34-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3052-36-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3052-38-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3052-31-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB