General
-
Target
0a0ecd510fcf70acb9f2586fc0dc952c_JaffaCakes118
-
Size
524KB
-
Sample
240624-wtlcjswblb
-
MD5
0a0ecd510fcf70acb9f2586fc0dc952c
-
SHA1
fdc1a5b1b37486c0b5286895d759560ff1626655
-
SHA256
858a1be946fa2119808d030baeba8b337e45c5a7b31adb1a40f5a46fdea95cd8
-
SHA512
67be46c925f2be8d5535c406f119997ab9f88bf716a79d0895eb6d6d666ae1a0042fc9771248855f30c5cdbf23413ac95d8d3e2497d922da0a07fbd9c6a04a9d
-
SSDEEP
12288:T6bvdl0zCB8EDItMTzwg7lMQsvNuqZBRbZEYTwdD7IjLg:cvdezCByqTtlMQsFuqzRbzI7I
Static task
static1
Behavioral task
behavioral1
Sample
0a0ecd510fcf70acb9f2586fc0dc952c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0a0ecd510fcf70acb9f2586fc0dc952c_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
0a0ecd510fcf70acb9f2586fc0dc952c_JaffaCakes118
-
Size
524KB
-
MD5
0a0ecd510fcf70acb9f2586fc0dc952c
-
SHA1
fdc1a5b1b37486c0b5286895d759560ff1626655
-
SHA256
858a1be946fa2119808d030baeba8b337e45c5a7b31adb1a40f5a46fdea95cd8
-
SHA512
67be46c925f2be8d5535c406f119997ab9f88bf716a79d0895eb6d6d666ae1a0042fc9771248855f30c5cdbf23413ac95d8d3e2497d922da0a07fbd9c6a04a9d
-
SSDEEP
12288:T6bvdl0zCB8EDItMTzwg7lMQsvNuqZBRbZEYTwdD7IjLg:cvdezCByqTtlMQsFuqzRbzI7I
Score10/10-
Modifies WinLogon for persistence
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1