Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 03:51
Behavioral task
behavioral1
Sample
2a533f6c86b59a325848b9a81863a717_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a533f6c86b59a325848b9a81863a717_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2a533f6c86b59a325848b9a81863a717_JaffaCakes118.exe
-
Size
316KB
-
MD5
2a533f6c86b59a325848b9a81863a717
-
SHA1
096772b8417ec05c2509221e790f83d1b2273403
-
SHA256
99b3ddc4c8b780c26336aa01704a4eb474050c3577e8c65a773ce7996b77cc38
-
SHA512
c5a890fda5662ad9203d9b9807aec062fc64e0e82179c3bfc1758314bbbdb5dc79b76f3e22d4f03eeb0cade9fcb0a8437a27969e9732c20ce035e2c8c01d1de9
-
SSDEEP
6144:52e7n7qanYWgWuLyhUTLHs54YB9tvMrNINwta3FmZAIin:XnPYWgWWs54YBWNINwtU0an
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2a533f6c86b59a325848b9a81863a717_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1356-0-0x0000000000B80000-0x0000000000C3B000-memory.dmp upx behavioral1/memory/1356-1-0x0000000000B80000-0x0000000000C3B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a533f6c86b59a325848b9a81863a717_JaffaCakes118.exe