General
-
Target
b46f73950863d53d279ad0a731f5888a_JaffaCakes118
-
Size
826KB
-
Sample
240821-we8jjawblq
-
MD5
b46f73950863d53d279ad0a731f5888a
-
SHA1
31c9f36e7ea800c216752595945901caeacdb619
-
SHA256
19f1011f9dc9972a3ae122b0bf2e8e3df26b8721ece4b9afa1b50caf1bb81099
-
SHA512
08266d1646e2e4895027357e40281867154eca49eea8ff63affad28f876929fc1878a5db37a73756cf2a99ca683b0b31858eee1a6a436a15cd88017f5266dd46
-
SSDEEP
12288:4q+/TXNFm3lChFvkoQp2TyETQpTomJaMjcGMcRLa+NkxAAM/Xq2R83IjtRyLOcVn:4qm/HTQYiPaMjc7zxAjPRdj0LgLbV2
Behavioral task
behavioral1
Sample
b46f73950863d53d279ad0a731f5888a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b46f73950863d53d279ad0a731f5888a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
b46f73950863d53d279ad0a731f5888a_JaffaCakes118
-
Size
826KB
-
MD5
b46f73950863d53d279ad0a731f5888a
-
SHA1
31c9f36e7ea800c216752595945901caeacdb619
-
SHA256
19f1011f9dc9972a3ae122b0bf2e8e3df26b8721ece4b9afa1b50caf1bb81099
-
SHA512
08266d1646e2e4895027357e40281867154eca49eea8ff63affad28f876929fc1878a5db37a73756cf2a99ca683b0b31858eee1a6a436a15cd88017f5266dd46
-
SSDEEP
12288:4q+/TXNFm3lChFvkoQp2TyETQpTomJaMjcGMcRLa+NkxAAM/Xq2R83IjtRyLOcVn:4qm/HTQYiPaMjc7zxAjPRdj0LgLbV2
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1