Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe
-
Size
438KB
-
MD5
d3a9b64dbdb85c04439021a74d326be9
-
SHA1
ebb4af6524db37cc1d5f4c95a2bdf7df2f2e01da
-
SHA256
d02f3cac4c1754339eaa68db313c88ece30b98ef89d42013a942e1c463ce8138
-
SHA512
779c3b88e1ae6d42c79fb6e78d55f4d32a81460da70c0e599d6e99ceb306a1a8a9ee8b2f0af9f69101c0434b939077277694a5fef0b9e47547122ad6f46b6f67
-
SSDEEP
12288:a0uvgX2LP7dP+LrScXjff9JBOlkNlWLab:CvgX2FP+LrHXrf9JBOeZb
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\j: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\n: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\u: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\h: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\q: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\v: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\w: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\x: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\y: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\s: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\e: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\i: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\l: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\m: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\o: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\r: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\g: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\k: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\p: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\t: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe File opened (read-only) \??\z: d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3a9b64dbdb85c04439021a74d326be9_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:4824