General
-
Target
8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118
-
Size
412KB
-
Sample
240812-an42ta1ard
-
MD5
8c959ce0c4d5f14751bf85bfd81b214b
-
SHA1
61bd188d4c4fbad361e209c9ce107a710035b6c5
-
SHA256
8894e0f387acf167b269af0578698d00887f26ed11eb4a17d818b5a03b01bdb7
-
SHA512
5d3983ddaf84eed401d6b2bb075e1b32ecaec93664681747b62621bc4bdeb9640e39d176d3a4c67374988f661d49e7bd3de443d75eca9a05deafed4bdbf4c47b
-
SSDEEP
6144:mrlZ/xSAeSIehcDTfWWA1YkJdro64g56u5BIeu5woseBn0hqFL1BDc:a/A9SIeqT+W6E63MiIeIRqhuL1BD
Static task
static1
Behavioral task
behavioral1
Sample
8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
8c959ce0c4d5f14751bf85bfd81b214b_JaffaCakes118
-
Size
412KB
-
MD5
8c959ce0c4d5f14751bf85bfd81b214b
-
SHA1
61bd188d4c4fbad361e209c9ce107a710035b6c5
-
SHA256
8894e0f387acf167b269af0578698d00887f26ed11eb4a17d818b5a03b01bdb7
-
SHA512
5d3983ddaf84eed401d6b2bb075e1b32ecaec93664681747b62621bc4bdeb9640e39d176d3a4c67374988f661d49e7bd3de443d75eca9a05deafed4bdbf4c47b
-
SSDEEP
6144:mrlZ/xSAeSIehcDTfWWA1YkJdro64g56u5BIeu5woseBn0hqFL1BDc:a/A9SIeqT+W6E63MiIeIRqhuL1BD
-
Modifies WinLogon for persistence
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1