Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31/10/2024, 16:51

General

  • Target

    83847f678c82e8f957b8e2c9393ceb94_JaffaCakes118.exe

  • Size

    200KB

  • MD5

    83847f678c82e8f957b8e2c9393ceb94

  • SHA1

    9d7a5676e658d8a8591a6ab6dcf0b88047c03419

  • SHA256

    767b6ccc725c36f7e1dcb7fd827595f8a93986fadfa8bf5fe82c69d9cc2fc264

  • SHA512

    23526ef6307aecaaf4e9a1612deeb796747f0959f4dcba6630f8f2f0b87d383a87db8d459f3e0ad3c341238ff78d3ff0584f7df08a075e6e98597a82836bc8ba

  • SSDEEP

    3072:SHBIbAyKKrpnpJly96HM0XU+aDe5UEGJSKz7ccRJMM3Ojl5MwddgFZcjA4PTbq4:ZbZpnhCn+aCyIK3ccnMxjrScAgTj

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83847f678c82e8f957b8e2c9393ceb94_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\83847f678c82e8f957b8e2c9393ceb94_JaffaCakes118.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    PID:3056

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3056-7-0x0000000000950000-0x0000000000951000-memory.dmp

          Filesize

          4KB

        • memory/3056-6-0x0000000000950000-0x0000000000951000-memory.dmp

          Filesize

          4KB

        • memory/3056-5-0x0000000000950000-0x0000000000951000-memory.dmp

          Filesize

          4KB

        • memory/3056-4-0x0000000000940000-0x0000000000941000-memory.dmp

          Filesize

          4KB

        • memory/3056-3-0x0000000000940000-0x0000000000941000-memory.dmp

          Filesize

          4KB

        • memory/3056-2-0x0000000000940000-0x0000000000941000-memory.dmp

          Filesize

          4KB

        • memory/3056-1-0x0000000000940000-0x0000000000941000-memory.dmp

          Filesize

          4KB

        • memory/3056-0-0x0000000001000000-0x0000000001078000-memory.dmp

          Filesize

          480KB

        • memory/3056-16-0x0000000000960000-0x0000000000961000-memory.dmp

          Filesize

          4KB

        • memory/3056-15-0x0000000000980000-0x0000000000981000-memory.dmp

          Filesize

          4KB

        • memory/3056-14-0x0000000000990000-0x0000000000991000-memory.dmp

          Filesize

          4KB

        • memory/3056-13-0x0000000000290000-0x0000000000291000-memory.dmp

          Filesize

          4KB

        • memory/3056-12-0x0000000000170000-0x0000000000171000-memory.dmp

          Filesize

          4KB

        • memory/3056-11-0x0000000000930000-0x0000000000933000-memory.dmp

          Filesize

          12KB

        • memory/3056-10-0x00000000009B0000-0x00000000009B1000-memory.dmp

          Filesize

          4KB

        • memory/3056-9-0x00000000009A0000-0x00000000009A1000-memory.dmp

          Filesize

          4KB

        • memory/3056-8-0x0000000000940000-0x0000000000942000-memory.dmp

          Filesize

          8KB

        • memory/3056-17-0x0000000001000000-0x0000000001078000-memory.dmp

          Filesize

          480KB

        • memory/3056-18-0x0000000000940000-0x0000000000941000-memory.dmp

          Filesize

          4KB