General
-
Target
5745cf6f1e7c4baa569c3660bff915b3_JaffaCakes118
-
Size
474KB
-
Sample
240518-2x9r7sce6z
-
MD5
5745cf6f1e7c4baa569c3660bff915b3
-
SHA1
1e6ac100fbc24b0fe3216341cf3dc6b518982a74
-
SHA256
5af20242a71fcf818933371a01e1881276b4454d8a32b0250cd491796716a396
-
SHA512
8879d69a36b4ad81020e5aab5bc85172171f5f273fcb08385a75ec1426766529b680d0f9b0eba1b567f513ceb1f57e67b29f5a8aa22848e71708809a205e7f66
-
SSDEEP
6144:cEYewRh3hRDJoiEOGG1c0H3OsLoiBaOSIhJM4lIg5m3Mj2PRk5Adw8lRM:cEYXnDJoi9cCeyogau8k9jSRkwjM
Static task
static1
Behavioral task
behavioral1
Sample
5745cf6f1e7c4baa569c3660bff915b3_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
5745cf6f1e7c4baa569c3660bff915b3_JaffaCakes118
-
Size
474KB
-
MD5
5745cf6f1e7c4baa569c3660bff915b3
-
SHA1
1e6ac100fbc24b0fe3216341cf3dc6b518982a74
-
SHA256
5af20242a71fcf818933371a01e1881276b4454d8a32b0250cd491796716a396
-
SHA512
8879d69a36b4ad81020e5aab5bc85172171f5f273fcb08385a75ec1426766529b680d0f9b0eba1b567f513ceb1f57e67b29f5a8aa22848e71708809a205e7f66
-
SSDEEP
6144:cEYewRh3hRDJoiEOGG1c0H3OsLoiBaOSIhJM4lIg5m3Mj2PRk5Adw8lRM:cEYXnDJoi9cCeyogau8k9jSRkwjM
-
Modifies firewall policy service
-
Sets file execution options in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1