General
-
Target
7154b332b728ef3629db9316a7aa2811_JaffaCakes118
-
Size
160KB
-
Sample
240725-1fkajsyhka
-
MD5
7154b332b728ef3629db9316a7aa2811
-
SHA1
3b5f4040c8d800b58b60761263fb455995ae85a6
-
SHA256
97804996681603ffe0366a93280881b45b4ac8922d87a318b4390b42f177ba64
-
SHA512
372921db6a089eca3ae13ec4225038b3066e39aa75ff03bdf1d7af67765ff186eb1dc7e391467c0ff70b70bbc4997cff739f34ae2453060fff0f72242043f3fd
-
SSDEEP
3072:9sPuaMvwBICYPLuECwbjQ9fkJCEKnBnouXl+rK+SFwwa5ftGf0iI:kIwBIrPplbU9cR6J9XqexSII
Static task
static1
Behavioral task
behavioral1
Sample
7154b332b728ef3629db9316a7aa2811_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7154b332b728ef3629db9316a7aa2811_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
7154b332b728ef3629db9316a7aa2811_JaffaCakes118
-
Size
160KB
-
MD5
7154b332b728ef3629db9316a7aa2811
-
SHA1
3b5f4040c8d800b58b60761263fb455995ae85a6
-
SHA256
97804996681603ffe0366a93280881b45b4ac8922d87a318b4390b42f177ba64
-
SHA512
372921db6a089eca3ae13ec4225038b3066e39aa75ff03bdf1d7af67765ff186eb1dc7e391467c0ff70b70bbc4997cff739f34ae2453060fff0f72242043f3fd
-
SSDEEP
3072:9sPuaMvwBICYPLuECwbjQ9fkJCEKnBnouXl+rK+SFwwa5ftGf0iI:kIwBIrPplbU9cR6J9XqexSII
Score10/10-
Modifies WinLogon for persistence
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops file in Drivers directory
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Looks for VMWare Tools registry key
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1