General
-
Target
34aea2abc2fa0973aa1531313bf34c36_JaffaCakes118
-
Size
105KB
-
Sample
240710-pfwssszaja
-
MD5
34aea2abc2fa0973aa1531313bf34c36
-
SHA1
6a13bf9c3c74fc740fa0c3ef1e69c4073f9f366f
-
SHA256
633c748131901f08f3a299e75a2600c6ddf8cb5aa8c40ae7991c1e80d87c8867
-
SHA512
65dbdcca32130a3bb840711197fb3a1cbad877191befa2cb6ee8186dd5cf63d267d5f2f752e39a267bc6867f0811626f56cac55e14002abb73994a6ea6a6a28f
-
SSDEEP
3072:vgh2I2r6EHIABO7Q+Wzk8jwaaHw7Koj4r0c7:6EH7yi
Static task
static1
Behavioral task
behavioral1
Sample
34aea2abc2fa0973aa1531313bf34c36_JaffaCakes118.exe
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
34aea2abc2fa0973aa1531313bf34c36_JaffaCakes118
-
Size
105KB
-
MD5
34aea2abc2fa0973aa1531313bf34c36
-
SHA1
6a13bf9c3c74fc740fa0c3ef1e69c4073f9f366f
-
SHA256
633c748131901f08f3a299e75a2600c6ddf8cb5aa8c40ae7991c1e80d87c8867
-
SHA512
65dbdcca32130a3bb840711197fb3a1cbad877191befa2cb6ee8186dd5cf63d267d5f2f752e39a267bc6867f0811626f56cac55e14002abb73994a6ea6a6a28f
-
SSDEEP
3072:vgh2I2r6EHIABO7Q+Wzk8jwaaHw7Koj4r0c7:6EH7yi
-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1