General
-
Target
635db40b1e2754b332deb815840d8805_JaffaCakes118
-
Size
936KB
-
Sample
240722-qtlenazcmg
-
MD5
635db40b1e2754b332deb815840d8805
-
SHA1
71b200469cc78e3e76dc565d0649a4e9b42f68ec
-
SHA256
e4266098d0bb993fa2af3f67e21659dca9af0955b71426a67211697b68f5342b
-
SHA512
28dc94409112c8717b808f2da10184f6c00b682252346ff3b829696413aecb89103d941036e1861ef55cee71960090657522470631e9e99b828a7e65e42e4fee
-
SSDEEP
24576:RrukSbiWEjlAHCSka4YEGubblIkhHJGyIEIGaVTe+Px7:RdKiWriSF4dvlPIOMTeMF
Behavioral task
behavioral1
Sample
635db40b1e2754b332deb815840d8805_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
635db40b1e2754b332deb815840d8805_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
635db40b1e2754b332deb815840d8805_JaffaCakes118
-
Size
936KB
-
MD5
635db40b1e2754b332deb815840d8805
-
SHA1
71b200469cc78e3e76dc565d0649a4e9b42f68ec
-
SHA256
e4266098d0bb993fa2af3f67e21659dca9af0955b71426a67211697b68f5342b
-
SHA512
28dc94409112c8717b808f2da10184f6c00b682252346ff3b829696413aecb89103d941036e1861ef55cee71960090657522470631e9e99b828a7e65e42e4fee
-
SSDEEP
24576:RrukSbiWEjlAHCSka4YEGubblIkhHJGyIEIGaVTe+Px7:RdKiWriSF4dvlPIOMTeMF
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1