General
-
Target
90e190e1b975158170d5cd0d59f4c7af_JaffaCakes118
-
Size
9.0MB
-
Sample
240603-hlt3tsfc8t
-
MD5
90e190e1b975158170d5cd0d59f4c7af
-
SHA1
493fce42a79faff5c45aa519284504f5192cab44
-
SHA256
2b554069e95325e2d71e8d75a6d624b0b3c31abe8ed6cb29f72ecbae65e4545c
-
SHA512
f7910890deee41491f9fcb6ed56468d92dc16c49c1825a68f0d249adcae6c358e3ebf2c2b5ac802b6a964e1cf9e6014f98457f69ab8a927e1b564d85fb8ff067
-
SSDEEP
49152:pBW5GKin2v7LOSOJ/RX88xHM67MQaBNJ6lW1mWEBMbU7DePqTAwxQ+Hyxzdca5NU:pBn
Static task
static1
Behavioral task
behavioral1
Sample
90e190e1b975158170d5cd0d59f4c7af_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
90e190e1b975158170d5cd0d59f4c7af_JaffaCakes118
-
Size
9.0MB
-
MD5
90e190e1b975158170d5cd0d59f4c7af
-
SHA1
493fce42a79faff5c45aa519284504f5192cab44
-
SHA256
2b554069e95325e2d71e8d75a6d624b0b3c31abe8ed6cb29f72ecbae65e4545c
-
SHA512
f7910890deee41491f9fcb6ed56468d92dc16c49c1825a68f0d249adcae6c358e3ebf2c2b5ac802b6a964e1cf9e6014f98457f69ab8a927e1b564d85fb8ff067
-
SSDEEP
49152:pBW5GKin2v7LOSOJ/RX88xHM67MQaBNJ6lW1mWEBMbU7DePqTAwxQ+Hyxzdca5NU:pBn
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Virtualization/Sandbox Evasion
2