Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 22:05
Static task
static1
Behavioral task
behavioral1
Sample
94eaeefaa74cd4f5c514e8fc597ec178_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
94eaeefaa74cd4f5c514e8fc597ec178_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
94eaeefaa74cd4f5c514e8fc597ec178_JaffaCakes118.exe
-
Size
156KB
-
MD5
94eaeefaa74cd4f5c514e8fc597ec178
-
SHA1
04e1583b4a45fe8a46e9650f9df57e9604500097
-
SHA256
c88258da586f9e3daf2e617de63709b5d0befb693604245755a93fe8e1f3fc03
-
SHA512
fe44f6b630b02e6ec36d5f9a84b48473964f19c6ed7b127efe1089d0eb92eef258c2896342e05bb6dac5e0a4524bf0a3f1ae406e8e949cde9300a13886fc327b
-
SSDEEP
3072:md18UaFPmgRMNlPTGQQm6ytwZEsrYkK4JhnhM71wof:S298gWNlPTGQQm6agrdJhnhMxw4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1720 tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2192 94eaeefaa74cd4f5c514e8fc597ec178_JaffaCakes118.exe 2192 94eaeefaa74cd4f5c514e8fc597ec178_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 94eaeefaa74cd4f5c514e8fc597ec178_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94eaeefaa74cd4f5c514e8fc597ec178_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2192 94eaeefaa74cd4f5c514e8fc597ec178_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1720 2192 94eaeefaa74cd4f5c514e8fc597ec178_JaffaCakes118.exe 30 PID 2192 wrote to memory of 1720 2192 94eaeefaa74cd4f5c514e8fc597ec178_JaffaCakes118.exe 30 PID 2192 wrote to memory of 1720 2192 94eaeefaa74cd4f5c514e8fc597ec178_JaffaCakes118.exe 30 PID 2192 wrote to memory of 1720 2192 94eaeefaa74cd4f5c514e8fc597ec178_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\94eaeefaa74cd4f5c514e8fc597ec178_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\94eaeefaa74cd4f5c514e8fc597ec178_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵
- Executes dropped EXE
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5dc1c160ddf0af52ad3615df1a20d8b2f
SHA1da106660d58824155088aa02241da0faa1e3da8f
SHA2568020a6442b78c1a8a5659efa28b6b9b7d91c7a158193536cbae98c5905e44372
SHA51278f46229f41be15f68972f90f150048a5ebe6ed0fb24c9daca9b1ccdc026498dc0890ce6657a3e13571c7b47552acd532c1e88cbcf833e8f3ceb6047e4b8b82e