General
-
Target
b2dcc251d589d2d0f426ff89f6e7e875_JaffaCakes118
-
Size
524KB
-
Sample
240821-ky8svszdpe
-
MD5
b2dcc251d589d2d0f426ff89f6e7e875
-
SHA1
90c98dd694923bebe0e4096346a32b75a338e4a7
-
SHA256
0c30a137be278c3dadeb78f7b401199b0c8f1367d31c3cf373b4fafddf8218db
-
SHA512
5e052d96e4a1819f0ab5a8ea4df0ce748e54680d9180dd02c9fdb145f3e2a4e24b3d76389f9922b913664ecfae0a58716c8dc96fbac0a6724f6e7d4d85f306bc
-
SSDEEP
12288:U4E3oO0CL0z3/+UXgnphMaXhkx43anKEkTn:U4E3+UODXgDEWaKTn
Static task
static1
Behavioral task
behavioral1
Sample
b2dcc251d589d2d0f426ff89f6e7e875_JaffaCakes118.dll
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
b2dcc251d589d2d0f426ff89f6e7e875_JaffaCakes118
-
Size
524KB
-
MD5
b2dcc251d589d2d0f426ff89f6e7e875
-
SHA1
90c98dd694923bebe0e4096346a32b75a338e4a7
-
SHA256
0c30a137be278c3dadeb78f7b401199b0c8f1367d31c3cf373b4fafddf8218db
-
SHA512
5e052d96e4a1819f0ab5a8ea4df0ce748e54680d9180dd02c9fdb145f3e2a4e24b3d76389f9922b913664ecfae0a58716c8dc96fbac0a6724f6e7d4d85f306bc
-
SSDEEP
12288:U4E3oO0CL0z3/+UXgnphMaXhkx43anKEkTn:U4E3+UODXgDEWaKTn
-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Modify Registry
4