Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 15:41
Behavioral task
behavioral1
Sample
13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe
-
Size
209KB
-
MD5
13f51c8c42e44bcb459c62e1c0e0e93b
-
SHA1
4565555378dee3a58c48ceec81aa67a219c3f383
-
SHA256
7d05eb337af8b57ff50b2b8be75ac07f2c598ba180854e0b51a2121c0b8ed7c8
-
SHA512
e4934bf149d45d29f59bd3f8bec77a386c5eaaff29e964710b24ffca276975620278b09142b59d9eaced80669bff94fb6173f57c44cf956b30213f807af20db4
-
SSDEEP
3072:HES0Iakl4ZkjMPzYg7m6p9MmnoggXLqggq2P6YPDqbpI883JKTaBGvzOw:HESA+4KQ7u6EmnNIbgqu6YPTl5OaI1
Malware Config
Signatures
-
Unexpected DNS network traffic destination 11 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 131.215.254.100 Destination IP 146.217.15.253 Destination IP 199.5.46.164 Destination IP 128.192.1.193 Destination IP 155.53.1.2 Destination IP 203.241.135.130 Destination IP 12.146.131.10 Destination IP 134.121.2.54 Destination IP 211.115.194.1 Destination IP 151.142.222.25 Destination IP 193.110.128.201 -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2860-0-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2860-5-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2860-7-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2860-17-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2860-18-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2860-19-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2860-20-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2860-21-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2860-28-0x0000000000400000-0x0000000000465000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe 2860 13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\13f51c8c42e44bcb459c62e1c0e0e93b_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:2860