Analysis
-
max time kernel
0s -
max time network
4s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 21:51
Static task
static1
Behavioral task
behavioral1
Sample
bf7d41b72bc242468461fa098592990a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bf7d41b72bc242468461fa098592990a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bf7d41b72bc242468461fa098592990a_JaffaCakes118.exe
-
Size
149KB
-
MD5
bf7d41b72bc242468461fa098592990a
-
SHA1
368ebdb322adbc23b45d880036a19b6b6a34c28e
-
SHA256
babfb39be1e3bd306e289e02ddbfac95e5a4c84a6fdbf3aa914925d1b63d22b7
-
SHA512
8584843ed101d75e765ae073936ef349d9b0dbd53a26ddefea40f45bfb0d3010ee22c5261c2f4b14b4eb165763ac392cb8fec5cdec4d0ba1108a81357f8b026d
-
SSDEEP
3072:dxcaNnKlZbaPmakqBhDvyztgPq+ettVHOwOx6LL9UG3oH+OR5/I:drJKrba6qBNyqyHtVmx4Z0/
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 bf7d41b72bc242468461fa098592990a_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2436 bf7d41b72bc242468461fa098592990a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2436 bf7d41b72bc242468461fa098592990a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf7d41b72bc242468461fa098592990a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf7d41b72bc242468461fa098592990a_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:2436