General
-
Target
1d8106f4e262a3d05864165bead167e9_JaffaCakes118
-
Size
100KB
-
Sample
240702-1a9m9avblm
-
MD5
1d8106f4e262a3d05864165bead167e9
-
SHA1
d018e2d1f7eda030f121359bb5b3f4bb84a81e15
-
SHA256
442688216565b95b8fa53e1db30cec3b09030824c3ed63c9f00cc2b256832697
-
SHA512
c8af9196426792bb90d01768910fc4d3ec8978a3dcc293889b4a60e8cc6ebc2fcac74fa021a35ab3d1d3937f292cbf47ec8350aa37cf2542ae163604585f18bf
-
SSDEEP
3072:rtm6BGBr+nU5tkt74R7ymx5GVk8jwaaHw7Koj4rDM7GN:rtdBGcU5tJt8i
Static task
static1
Behavioral task
behavioral1
Sample
1d8106f4e262a3d05864165bead167e9_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
1d8106f4e262a3d05864165bead167e9_JaffaCakes118
-
Size
100KB
-
MD5
1d8106f4e262a3d05864165bead167e9
-
SHA1
d018e2d1f7eda030f121359bb5b3f4bb84a81e15
-
SHA256
442688216565b95b8fa53e1db30cec3b09030824c3ed63c9f00cc2b256832697
-
SHA512
c8af9196426792bb90d01768910fc4d3ec8978a3dcc293889b4a60e8cc6ebc2fcac74fa021a35ab3d1d3937f292cbf47ec8350aa37cf2542ae163604585f18bf
-
SSDEEP
3072:rtm6BGBr+nU5tkt74R7ymx5GVk8jwaaHw7Koj4rDM7GN:rtdBGcU5tJt8i
-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1