Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 11:49
Static task
static1
Behavioral task
behavioral1
Sample
133d79bc5fdc96d84c01ad2da0314c0a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
133d79bc5fdc96d84c01ad2da0314c0a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
133d79bc5fdc96d84c01ad2da0314c0a_JaffaCakes118.exe
-
Size
275KB
-
MD5
133d79bc5fdc96d84c01ad2da0314c0a
-
SHA1
f1200d3aeef2cd9a8f0758a4a5342c6ad2bb5348
-
SHA256
1e33154f47add081bf3a8b308606eba2161518d5ec53508af0e485b941f67a16
-
SHA512
83a68a6ae2d50c14dfe40765bb45ad588f7fc2bb644df9d2573d31866ea421a275f8f0fdbfacd9d690a80bee7db128d584e416bfc20456c27840c31a0baf6434
-
SSDEEP
6144:N7i68hkfKx/8GcsMBvMCmJpArWnysskEL1gUs2OXI8AcP78EBwC2IRq:N1Uk+esTCm8gyLZL1p2I8rBwC2Ic
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2260 hldrrr.exe -
Loads dropped DLL 2 IoCs
pid Process 2572 133d79bc5fdc96d84c01ad2da0314c0a_JaffaCakes118.exe 2572 133d79bc5fdc96d84c01ad2da0314c0a_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 133d79bc5fdc96d84c01ad2da0314c0a_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 hldrrr.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\hldrrr.exe 133d79bc5fdc96d84c01ad2da0314c0a_JaffaCakes118.exe File created C:\Windows\SysWOW64\hldrrr.exe 133d79bc5fdc96d84c01ad2da0314c0a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini hldrrr.exe File opened for modification C:\Windows\SysWOW64\hldrrr.exe hldrrr.exe File created C:\Windows\SysWOW64\hldrrr.exe hldrrr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 133d79bc5fdc96d84c01ad2da0314c0a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2260 2572 133d79bc5fdc96d84c01ad2da0314c0a_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2260 2572 133d79bc5fdc96d84c01ad2da0314c0a_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2260 2572 133d79bc5fdc96d84c01ad2da0314c0a_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2260 2572 133d79bc5fdc96d84c01ad2da0314c0a_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\133d79bc5fdc96d84c01ad2da0314c0a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\133d79bc5fdc96d84c01ad2da0314c0a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\hldrrr.exe"C:\Windows\system32\hldrrr.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD5133d79bc5fdc96d84c01ad2da0314c0a
SHA1f1200d3aeef2cd9a8f0758a4a5342c6ad2bb5348
SHA2561e33154f47add081bf3a8b308606eba2161518d5ec53508af0e485b941f67a16
SHA51283a68a6ae2d50c14dfe40765bb45ad588f7fc2bb644df9d2573d31866ea421a275f8f0fdbfacd9d690a80bee7db128d584e416bfc20456c27840c31a0baf6434