General
-
Target
2dd74e8823191aa09223f463c1ed6c42_JaffaCakes118
-
Size
341KB
-
Sample
240329-1wed8sbf52
-
MD5
2dd74e8823191aa09223f463c1ed6c42
-
SHA1
48e6a01df30dc9b747118020ebba0ca033ed706e
-
SHA256
aaef9bebdcd49a4d0191a751bb18d2ae1e182851cf5f6c4c5cea70aba8de86f8
-
SHA512
7934007f62682d076e6a66b01bf9cc90c4c6b8c098fb51f5ae9e8820f577c76bcb05917b4bc0d3822d103e24eaf544ae6c8d878fe7ef3701b32b83a261b7db63
-
SSDEEP
6144:YsYC13QdnprC6ft8F/lP5FAphjwIj6bV9iLUyfrJdpMo:YDCRQdnU618YsIjAWUyTJMo
Static task
static1
Behavioral task
behavioral1
Sample
2dd74e8823191aa09223f463c1ed6c42_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
2dd74e8823191aa09223f463c1ed6c42_JaffaCakes118
-
Size
341KB
-
MD5
2dd74e8823191aa09223f463c1ed6c42
-
SHA1
48e6a01df30dc9b747118020ebba0ca033ed706e
-
SHA256
aaef9bebdcd49a4d0191a751bb18d2ae1e182851cf5f6c4c5cea70aba8de86f8
-
SHA512
7934007f62682d076e6a66b01bf9cc90c4c6b8c098fb51f5ae9e8820f577c76bcb05917b4bc0d3822d103e24eaf544ae6c8d878fe7ef3701b32b83a261b7db63
-
SSDEEP
6144:YsYC13QdnprC6ft8F/lP5FAphjwIj6bV9iLUyfrJdpMo:YDCRQdnU618YsIjAWUyTJMo
-
Modifies firewall policy service
-
Sets file execution options in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1