General
-
Target
b6251d6f1a7ff705616b6eda9a9430d7_JaffaCakes118
-
Size
848KB
-
Sample
240822-dspdpszarq
-
MD5
b6251d6f1a7ff705616b6eda9a9430d7
-
SHA1
02da09680f5ed92e6efe89fc0b2b6a7eb62cde64
-
SHA256
9df2f19fe78aba258e20b247c1c14cfdf78c0cd4ef37878518e4d7daf0f61fa1
-
SHA512
2600417e15d2a0ccdf51aed75fd187d99deaaa15715b5c7e67dda871aa96fa619899684922e1c441e550ed523a20a478c1367fd6447b47cad49d534ac511c6eb
-
SSDEEP
24576:RmZo+bYVAFhgH71wFQl/O10JC2v1Uf0pgs0kuO2:RmZThDCJ/tzv1U8plqO2
Static task
static1
Behavioral task
behavioral1
Sample
b6251d6f1a7ff705616b6eda9a9430d7_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b6251d6f1a7ff705616b6eda9a9430d7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
b6251d6f1a7ff705616b6eda9a9430d7_JaffaCakes118
-
Size
848KB
-
MD5
b6251d6f1a7ff705616b6eda9a9430d7
-
SHA1
02da09680f5ed92e6efe89fc0b2b6a7eb62cde64
-
SHA256
9df2f19fe78aba258e20b247c1c14cfdf78c0cd4ef37878518e4d7daf0f61fa1
-
SHA512
2600417e15d2a0ccdf51aed75fd187d99deaaa15715b5c7e67dda871aa96fa619899684922e1c441e550ed523a20a478c1367fd6447b47cad49d534ac511c6eb
-
SSDEEP
24576:RmZo+bYVAFhgH71wFQl/O10JC2v1Uf0pgs0kuO2:RmZThDCJ/tzv1U8plqO2
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1