General
-
Target
624eb760963643f673e5784ed8678fce_JaffaCakes118
-
Size
197KB
-
Sample
240521-g1zq7aba6z
-
MD5
624eb760963643f673e5784ed8678fce
-
SHA1
85b96efc9dd18402042ec142002e87aa704e3f7a
-
SHA256
deb55f6aaf15fa289a4af6d50e2839e86d78007bd878b3f522f91f3c407d5857
-
SHA512
755beaf36541b26c15ed606932a1c31ab39067f4aad9205ad59c09a1bb25bd60c39b1bd1c1433adb5859072cee0db186dc4b69b865bbb8e06754fc946cf1af6a
-
SSDEEP
6144:XbB/0YcoDB+gCS6/ynwZ6eaw6gULn1zXC0O/7:Xbt0FoDpCHb6eawbm17C0w
Static task
static1
Behavioral task
behavioral1
Sample
624eb760963643f673e5784ed8678fce_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
624eb760963643f673e5784ed8678fce_JaffaCakes118
-
Size
197KB
-
MD5
624eb760963643f673e5784ed8678fce
-
SHA1
85b96efc9dd18402042ec142002e87aa704e3f7a
-
SHA256
deb55f6aaf15fa289a4af6d50e2839e86d78007bd878b3f522f91f3c407d5857
-
SHA512
755beaf36541b26c15ed606932a1c31ab39067f4aad9205ad59c09a1bb25bd60c39b1bd1c1433adb5859072cee0db186dc4b69b865bbb8e06754fc946cf1af6a
-
SSDEEP
6144:XbB/0YcoDB+gCS6/ynwZ6eaw6gULn1zXC0O/7:Xbt0FoDpCHb6eawbm17C0w
-
Modifies firewall policy service
-
Sets file execution options in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1