Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
6fcfdd23a36fdc9595362f330c4dea35
-
SHA1
a8b641b389df4dd1f74b8e913b102d4c2f6c9c12
-
SHA256
d0ac3950fcd379d65ac0e7e5d7ab32262ddf021cd56cbc609c688695990a9c53
-
SHA512
89ac6753669785010645f09471d8d2d065c5886cbd147c5023b64d1bff25b45d18602d57b9da21883d6ad5a527648431bd5a904b48b33a28683bb01a1236ff70
-
SSDEEP
49152:jhPG+uycEgxXg5Vf4S5NNtBOMxraJ/ZxozDcDtT:lFuzKHrjOMI3F
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2408 6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe 2408 6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2408 6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2408 6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2408 6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe 2408 6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe 2408 6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe 2408 6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe 2408 6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe 2408 6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe 2408 6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe 2408 6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6fcfdd23a36fdc9595362f330c4dea35_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD54b30dbe1a79b2b7572ff637cb3765ced
SHA1b08eba0e9bdb62d426db8d2b3d451152a56f79a1
SHA2564208bdf90e97398a452d459d89562bda361bc6e911a385c4e31481a776f69e6d
SHA51240e99c4a9d160a734a1675d75209dd88c7389c95cf0d0b6101f7e9edb2f3ebfe85e7170f0f4bae8a2e9533048bd5ecd414797b02ef257aecd90431f0c29ccfce
-
Filesize
80KB
MD52428c64705f8c9201a816edd07237443
SHA1220b3bcffd333fcdf585b129015cb086d762f0af
SHA2566b1651e03dc8fa46ea85f599cadee51944777139a9da9ef4e50fd7a25c7aefcc
SHA512e3830b5a123fc9d0daf7f1885dadd762d63c66af39375c3251eb24021f015b14be33eb7ac339c499a0dca9a8e7263cbb2412bcd9ecdaadd7484360d7e600d787