General
-
Target
3842232d06e9bbad23c68e9befa445ae_JaffaCakes118
-
Size
598KB
-
Sample
240512-e32bpage9v
-
MD5
3842232d06e9bbad23c68e9befa445ae
-
SHA1
6283bd8489cf75dedc3d1489ccf93b5acc0c3492
-
SHA256
9eddb5fc86d355f6c10e5e450f3fde24ff070e4e93fe9218f10dc660b36c46d0
-
SHA512
11f9114dce081e2efea4cccbdfee21aa6ee4abab2acf7ae492b0448ca715b719334ad6a83570fde9caf4fd94fcbd767b94aba12054fdc7d1e2a73d1d96ee27c2
-
SSDEEP
6144:9ZDusLVUUnjDNfESZeGY9XsBFy56fgmVj1otMcUEwphR/35SI4AZgAwsT:94s5Uk5HZeMDHj1wM8UDN4qgbe
Static task
static1
Behavioral task
behavioral1
Sample
3842232d06e9bbad23c68e9befa445ae_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
3842232d06e9bbad23c68e9befa445ae_JaffaCakes118
-
Size
598KB
-
MD5
3842232d06e9bbad23c68e9befa445ae
-
SHA1
6283bd8489cf75dedc3d1489ccf93b5acc0c3492
-
SHA256
9eddb5fc86d355f6c10e5e450f3fde24ff070e4e93fe9218f10dc660b36c46d0
-
SHA512
11f9114dce081e2efea4cccbdfee21aa6ee4abab2acf7ae492b0448ca715b719334ad6a83570fde9caf4fd94fcbd767b94aba12054fdc7d1e2a73d1d96ee27c2
-
SSDEEP
6144:9ZDusLVUUnjDNfESZeGY9XsBFy56fgmVj1otMcUEwphR/35SI4AZgAwsT:94s5Uk5HZeMDHj1wM8UDN4qgbe
-
Modifies firewall policy service
-
Sets file execution options in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1