Analysis
-
max time kernel
141s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 22:40
Static task
static1
Behavioral task
behavioral1
Sample
61b25af23c667a2eed64bbb84f9a3a83_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
61b25af23c667a2eed64bbb84f9a3a83_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
61b25af23c667a2eed64bbb84f9a3a83_JaffaCakes118.exe
-
Size
163KB
-
MD5
61b25af23c667a2eed64bbb84f9a3a83
-
SHA1
6fd6fe67974ecafd41a24b1db04a3c2e34dae248
-
SHA256
55f8bf22f4afe26c0473b3399a30a1d07550d448c10ef6f5655c0d98e91731e8
-
SHA512
0dd8a306ed162b1ee618ad70d6ee8599219d5b1b17ede760e8f7f050fba4dee83ab599a7df6d7499727f60d08055676d58b2606eb4b657846864f4e5db435a6f
-
SSDEEP
3072:y68He74NIdwUaFPmgRMNlPTGQQm6ytwZEsrYkK4b5AUWCH3:ybHe7in98gWNlPTGQQm6agrdPWM
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 61b25af23c667a2eed64bbb84f9a3a83_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1512 61b25af23c667a2eed64bbb84f9a3a83_JaffaCakes118.exe