Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 08:08
Behavioral task
behavioral1
Sample
5b1bb570b22d6dbdaadf8d865e1be7d0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5b1bb570b22d6dbdaadf8d865e1be7d0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5b1bb570b22d6dbdaadf8d865e1be7d0_JaffaCakes118.exe
-
Size
95KB
-
MD5
5b1bb570b22d6dbdaadf8d865e1be7d0
-
SHA1
5be6ee5cd172ea94efa6ae49259354814d6f09c4
-
SHA256
1174aa31c999a21faa49b765757c164b3d51a6e85cff1e9fdf184eb785ef1b32
-
SHA512
bd63d6a5548b1239fed72c29965ddb84fd216c1be2f4fa2a85c088d335395930b1b7434520f0ca7537ad34400be24128372fdcacd46b0ffa5e7921fb36731f43
-
SSDEEP
1536:HC6g2KL+bD/wWQQZ55z+N0uJ+nL1UWQS2P0Fz2wAJLHPW8kwpDqPSi1VAlaU9/E0:HCz2KmD/wWHcRIn5UzSJVAVPW6q7Alai
Malware Config
Signatures
-
Drops file in Drivers directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\57aos21a.sys 5b1bb570b22d6dbdaadf8d865e1be7d0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\57aos21a.sys 5b1bb570b22d6dbdaadf8d865e1be7d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers\bdv4p.sys 5b1bb570b22d6dbdaadf8d865e1be7d0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\bdv4p.sys 5b1bb570b22d6dbdaadf8d865e1be7d0_JaffaCakes118.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\57aos21a\ImagePath = "system32\\drivers\\57aos21a.sys" 5b1bb570b22d6dbdaadf8d865e1be7d0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\bdv4p\ImagePath = "system32\\drivers\\bdv4p.sys" 5b1bb570b22d6dbdaadf8d865e1be7d0_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2812-0-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2812-9-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ydb6.dll 5b1bb570b22d6dbdaadf8d865e1be7d0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ydb6.dll 5b1bb570b22d6dbdaadf8d865e1be7d0_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 472 Process not Found 472 Process not Found