Analysis
-
max time kernel
130s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 21:57
Behavioral task
behavioral1
Sample
JaffaCakes118_57bdac3e41c7833d8beec567c2c0724e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_57bdac3e41c7833d8beec567c2c0724e.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_57bdac3e41c7833d8beec567c2c0724e.exe
-
Size
615KB
-
MD5
57bdac3e41c7833d8beec567c2c0724e
-
SHA1
2596482af5dcdf05c70b1809303ca7a38f005cfa
-
SHA256
56d1c96239ce557c3f29623e0baf5f25ab866065c986e0e08537219db122263a
-
SHA512
0c7c18f561734cede666f0a66cb5f4a4eb9cb7eaa2b57eb7f9f9b643ca4e8512a9870b703d7293fd26a0a5a33b7c6ffb57d0d043ba127b2861b5b42a832202e5
-
SSDEEP
12288:PQTTBgd2hY0XidgjVwJKtHnXCiKhGMlauX46BGXBHmCJ2EY:PTdQY0Xfj+JsHjGGGrX46BMBHnJ2D
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_57bdac3e41c7833d8beec567c2c0724e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBIOSDate JaffaCakes118_57bdac3e41c7833d8beec567c2c0724e.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 JaffaCakes118_57bdac3e41c7833d8beec567c2c0724e.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_57bdac3e41c7833d8beec567c2c0724e.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBIOSDate JaffaCakes118_57bdac3e41c7833d8beec567c2c0724e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_57bdac3e41c7833d8beec567c2c0724e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_57bdac3e41c7833d8beec567c2c0724e.exe"1⤵
- Checks BIOS information in registry
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1540