General
-
Target
669a8820f42031e50a160933f8562201_JaffaCakes118
-
Size
1.2MB
-
Sample
240723-hyll8atcpb
-
MD5
669a8820f42031e50a160933f8562201
-
SHA1
83aaccd7330ed876b0ff2362c3a9b5744759ce2d
-
SHA256
0985f6dee6b78ecad2d409776ef1fa5a1910355d0c2fd75507361ef42f0e15e0
-
SHA512
a108dfd367613d7f5e453227a7ac9293214e61e8545bb6565ec4a2bfc4038018f7cd8de3b470cf67e315a8f523df15adbd23b547667b6d77de8e9378b835f8d3
-
SSDEEP
24576:dweJp94oubd7seByJ3y0n2BZieWEIefGf11rWHT1MYpVknRNZI9AK:dzj4oAvMCIX9A5
Static task
static1
Behavioral task
behavioral1
Sample
669a8820f42031e50a160933f8562201_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
669a8820f42031e50a160933f8562201_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
669a8820f42031e50a160933f8562201_JaffaCakes118
-
Size
1.2MB
-
MD5
669a8820f42031e50a160933f8562201
-
SHA1
83aaccd7330ed876b0ff2362c3a9b5744759ce2d
-
SHA256
0985f6dee6b78ecad2d409776ef1fa5a1910355d0c2fd75507361ef42f0e15e0
-
SHA512
a108dfd367613d7f5e453227a7ac9293214e61e8545bb6565ec4a2bfc4038018f7cd8de3b470cf67e315a8f523df15adbd23b547667b6d77de8e9378b835f8d3
-
SSDEEP
24576:dweJp94oubd7seByJ3y0n2BZieWEIefGf11rWHT1MYpVknRNZI9AK:dzj4oAvMCIX9A5
Score10/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1