Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe
-
Size
250KB
-
MD5
3fc964ef6b0795b8dafe13383d3fafcb
-
SHA1
deb6b06589f3c97f40a6eee427169ff03ce669cf
-
SHA256
2788e5b0cf8f9f237f89da73349231ab8fd6f260f5eacf0501f70067a379404f
-
SHA512
8ba2793d3025ec7793ee5aa11590712685b466336d54ca41b58865ca535cd653318d0fd1e4757920009c15f55a9e87a7f7c6a49018fb4ff7edc32621d3ee8281
-
SSDEEP
6144:j7y+Qfb56BBMl5yyw5CpA/7sJ5pwvP6bQ7yMP+DE827KJq:/yf6aw5krJ5i6b7MP+Dd27
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\inf\ram32xp.dll 3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe File created C:\Windows\inf\ram65xp.dll 3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2820 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2820 AcroRd32.exe 2820 AcroRd32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2892 1276 3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe 30 PID 1276 wrote to memory of 2892 1276 3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe 30 PID 1276 wrote to memory of 2892 1276 3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe 30 PID 1276 wrote to memory of 2892 1276 3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe 30 PID 1276 wrote to memory of 2892 1276 3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe 30 PID 1276 wrote to memory of 2892 1276 3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe 30 PID 1276 wrote to memory of 2892 1276 3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe 30 PID 2744 wrote to memory of 2820 2744 explorer.exe 32 PID 2744 wrote to memory of 2820 2744 explorer.exe 32 PID 2744 wrote to memory of 2820 2744 explorer.exe 32 PID 2744 wrote to memory of 2820 2744 explorer.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3fc964ef6b0795b8dafe13383d3fafcb_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "c:\FINAL_TBF2.pdf"2⤵PID:2892
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\FINAL_TBF2.pdf"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f43bb53ad6a3b7caa25cab37ef188f08
SHA1c359188aff5baf9edb13216bac4ae5185398dd9e
SHA256a0f282bf30c29c13052ab84e96cc97bb0c1acbcffa8a42203b36ada1d1a49911
SHA512beb68310273d2c69263f6881da5a41516b1cef14a63de2879de5fc41d3f27fd105a90bf2778b834a51b364d32ba2dbee57f0d34aa786be66c60b833c444536bc