General
-
Target
fe27db8fda391121e331da6490fe57ab_JaffaCakes118
-
Size
209KB
-
Sample
240421-ca8tysga89
-
MD5
fe27db8fda391121e331da6490fe57ab
-
SHA1
91b5b3f10721e27c9532c74718c61f0155d101a0
-
SHA256
0f08254471b1ee8c79e00b73f7ca874ec590ac21466489cc98b24c35dde7c90d
-
SHA512
0ef86a8c3265b7477409f63368b3fcbc38e57522077d196f198891b1ca593511da26688c741ec80bdd4917173efcbee95d74e5273b53ff91c3645c9a443130ab
-
SSDEEP
3072:PIV+RlGM9K85rbyIxlPRBzgzXn/EU5jwaaHw7Koj4rHf4dgfJdAm+:AkPGM8QyIxl3sRgHfz+
Static task
static1
Behavioral task
behavioral1
Sample
fe27db8fda391121e331da6490fe57ab_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
fe27db8fda391121e331da6490fe57ab_JaffaCakes118
-
Size
209KB
-
MD5
fe27db8fda391121e331da6490fe57ab
-
SHA1
91b5b3f10721e27c9532c74718c61f0155d101a0
-
SHA256
0f08254471b1ee8c79e00b73f7ca874ec590ac21466489cc98b24c35dde7c90d
-
SHA512
0ef86a8c3265b7477409f63368b3fcbc38e57522077d196f198891b1ca593511da26688c741ec80bdd4917173efcbee95d74e5273b53ff91c3645c9a443130ab
-
SSDEEP
3072:PIV+RlGM9K85rbyIxlPRBzgzXn/EU5jwaaHw7Koj4rHf4dgfJdAm+:AkPGM8QyIxl3sRgHfz+
-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1