General
-
Target
6439891319cdfe03b284692ab0c14667_JaffaCakes118
-
Size
856KB
-
Sample
240722-wprc1azhrl
-
MD5
6439891319cdfe03b284692ab0c14667
-
SHA1
537bfc471700dfc8a61badfdadab84e97b4a223d
-
SHA256
b5f1c075ae4132af19711b541143c58d3563b8fbb132141c8fc029a8baf46b79
-
SHA512
f3a75d37c6833aff49913667216327994bde88a621548177ec7c434ce765109d575b3ddecb6d07606a61c935881ed29e383bf48bb0aff49c099dde7d30dee5bf
-
SSDEEP
12288:M7/VlrM6lD7BhIb8Xnc0jSDsCG2rU5pIyvJJLK1HKziKo6ZX9mOu/3RyiWTOYQ2m:EHmGRpfLjmawOu/hQ02I0XILJ
Static task
static1
Behavioral task
behavioral1
Sample
6439891319cdfe03b284692ab0c14667_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6439891319cdfe03b284692ab0c14667_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
6439891319cdfe03b284692ab0c14667_JaffaCakes118
-
Size
856KB
-
MD5
6439891319cdfe03b284692ab0c14667
-
SHA1
537bfc471700dfc8a61badfdadab84e97b4a223d
-
SHA256
b5f1c075ae4132af19711b541143c58d3563b8fbb132141c8fc029a8baf46b79
-
SHA512
f3a75d37c6833aff49913667216327994bde88a621548177ec7c434ce765109d575b3ddecb6d07606a61c935881ed29e383bf48bb0aff49c099dde7d30dee5bf
-
SSDEEP
12288:M7/VlrM6lD7BhIb8Xnc0jSDsCG2rU5pIyvJJLK1HKziKo6ZX9mOu/3RyiWTOYQ2m:EHmGRpfLjmawOu/hQ02I0XILJ
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Browser Extensions
1Pre-OS Boot
1Bootkit
1