Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 23:48
Behavioral task
behavioral1
Sample
915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe
-
Size
202KB
-
MD5
915e333813bbda94b5abdeadfe9e10d9
-
SHA1
16e3b717f6363973b599e8c1b5a047efff363431
-
SHA256
0633c9d3d4a0d2b1dc2b1d177ac0ff8de294801471f2e2bf14013130e8f0e35e
-
SHA512
23e13408bc058c5df3c23e5cea680f16ee13b71354d85a2130f49becb53957e4edc190f987f52bfe8c1ef3ff4daa97a9ed9a2942748b5911043efecaf854b2cd
-
SSDEEP
6144:Q2f7xz5jBEciLzLsOu+/ifpY5MY5FjV0FYtOsN/VmmIFN1W:Qul9lE/LsANz5jXtOsN/ImYa
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exedescription ioc process File opened (read-only) \??\t: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\g: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\i: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\m: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\r: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\u: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\k: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\o: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\q: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\s: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\p: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\w: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\h: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\j: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\l: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\n: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\z: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\e: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\v: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\x: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe File opened (read-only) \??\y: 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exedescription ioc process File opened for modification \??\PhysicalDrive0 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/2932-0-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2932-1-0x0000000000400000-0x0000000000476000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\915e333813bbda94b5abdeadfe9e10d9_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2932