General
-
Target
178f7d50bd986d2a78fc6d99b16a4a2c_JaffaCakes118
-
Size
330KB
-
Sample
240627-z46m1stekn
-
MD5
178f7d50bd986d2a78fc6d99b16a4a2c
-
SHA1
d02fb986d17b75f110b3a2f5967e7c20bb4dc0b6
-
SHA256
71c4d591fc374f893296f301db556d092b23190a6c46556e3a1fba14623efec2
-
SHA512
3f32e39cb0eb7442c08504124ab983159ec95148b67246eda06bce1d9b5e2bae8fd22e82f389a3280acd809a8a26ff9d773d6e554a1be4815b39fe588cf81431
-
SSDEEP
6144:zAaMLU3qAIG227cSy4gjhR6byiJ0nRTEFEeERY9:zAxU3xQD6byiKRMEeEy
Static task
static1
Behavioral task
behavioral1
Sample
178f7d50bd986d2a78fc6d99b16a4a2c_JaffaCakes118.dll
Resource
win7-20240419-en
Malware Config
Targets
-
-
Target
178f7d50bd986d2a78fc6d99b16a4a2c_JaffaCakes118
-
Size
330KB
-
MD5
178f7d50bd986d2a78fc6d99b16a4a2c
-
SHA1
d02fb986d17b75f110b3a2f5967e7c20bb4dc0b6
-
SHA256
71c4d591fc374f893296f301db556d092b23190a6c46556e3a1fba14623efec2
-
SHA512
3f32e39cb0eb7442c08504124ab983159ec95148b67246eda06bce1d9b5e2bae8fd22e82f389a3280acd809a8a26ff9d773d6e554a1be4815b39fe588cf81431
-
SSDEEP
6144:zAaMLU3qAIG227cSy4gjhR6byiJ0nRTEFEeERY9:zAxU3xQD6byiKRMEeEy
-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1