Analysis
-
max time kernel
0s -
max time network
2s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 02:44
Static task
static1
Behavioral task
behavioral1
Sample
4c7aafbbf8ad51599b12578b24884c18_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c7aafbbf8ad51599b12578b24884c18_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4c7aafbbf8ad51599b12578b24884c18_JaffaCakes118.exe
-
Size
122KB
-
MD5
4c7aafbbf8ad51599b12578b24884c18
-
SHA1
ca31f53d3df710f1e5e01c1a70572d86702fbb13
-
SHA256
bd46afa3e1f3ea48b2b1e6643dac9487a57f31d493b4fa7e4355a30a35b3868e
-
SHA512
9ba11e20e52305a70b875912cb7cfbf054597c8e11e667e1faf966dbf7623b9ed8045acd45be2dab4be833106caa0224f45168afc5dac240154ab66b7604b5bf
-
SSDEEP
3072:rFWZ1+iVrxn0KQ6SHi9YGOUmuH+W+1ykUAP2+9W:/SJrYGOUMW+1BTP2
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 4c7aafbbf8ad51599b12578b24884c18_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2784 4c7aafbbf8ad51599b12578b24884c18_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2784 4c7aafbbf8ad51599b12578b24884c18_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c7aafbbf8ad51599b12578b24884c18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4c7aafbbf8ad51599b12578b24884c18_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:2784