Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 10:47
Static task
static1
Behavioral task
behavioral1
Sample
4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exe
-
Size
21KB
-
MD5
4dfbad475b27a8a0efb1e9a7ef7970b2
-
SHA1
547450bb3a828bc8ac65dc31d96636ef77c2b610
-
SHA256
8f94644c3292463229a39c1cff372b557f6571493b4c84fed8bce221cc1125b0
-
SHA512
6f98e8353cf7ca146816a9d8a2e3913f967df453a90323de81b9d1152bb59c0194ae21fe79059d8296bb5f16bbe18f027ae376b2574a9ce1edb3c108d05905a2
-
SSDEEP
384:oCljiQc8rLfOf5x9nsBObC2ZQhCSgnPLUyLJ+6aOy9xRHjU:fiQcjX9nsBObxZQhCSgQyLA64l
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2224 2192 WerFault.exe 31 -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
IEXPLORE.EXEdescription ioc Process File opened for modification \??\PhysicalDrive0 IEXPLORE.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exedescription pid Process procid_target PID 1988 set thread context of 2192 1988 4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exe 31 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
IEXPLORE.EXEpid Process 2192 IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exedescription pid Process Token: SeIncBasePriorityPrivilege 1988 4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exeIEXPLORE.EXEdescription pid Process procid_target PID 1988 wrote to memory of 2192 1988 4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exe 31 PID 1988 wrote to memory of 2192 1988 4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exe 31 PID 1988 wrote to memory of 2192 1988 4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exe 31 PID 1988 wrote to memory of 2192 1988 4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exe 31 PID 1988 wrote to memory of 2192 1988 4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exe 31 PID 1988 wrote to memory of 2192 1988 4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exe 31 PID 1988 wrote to memory of 2192 1988 4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exe 31 PID 1988 wrote to memory of 2192 1988 4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2224 2192 IEXPLORE.EXE 32 PID 2192 wrote to memory of 2224 2192 IEXPLORE.EXE 32 PID 2192 wrote to memory of 2224 2192 IEXPLORE.EXE 32 PID 2192 wrote to memory of 2224 2192 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4dfbad475b27a8a0efb1e9a7ef7970b2_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 1563⤵
- Program crash
PID:2224
-
-