General
-
Target
bec704fd9c74a1fa792bcc7f8952a740_JaffaCakes118
-
Size
176KB
-
Sample
240824-rng1qawbrr
-
MD5
bec704fd9c74a1fa792bcc7f8952a740
-
SHA1
9fbbc8bd8b4f7d493b5b8a86cddb106cb082d02d
-
SHA256
317c67a7cb21efecae972b2e74d5bddaa5d19f3db0ad094b64b6225df21b2881
-
SHA512
20a834ae27f8f81017eed7e5de40a3103d5884f205d1f18c7dba25e02a58c7aca0c742533c7ad8cb69122d0f458f54f7061e29ff00adb7c89c8a47bd9ad9d072
-
SSDEEP
3072:DXzv+WutGMFzS7f6nc46WmiJQm7Uj6iJez3YQ+pJza2qQwyU1kADDVi4H:3L0/gCPxrJAAzIpZa2K11i4H
Static task
static1
Behavioral task
behavioral1
Sample
bec704fd9c74a1fa792bcc7f8952a740_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bec704fd9c74a1fa792bcc7f8952a740_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
bec704fd9c74a1fa792bcc7f8952a740_JaffaCakes118
-
Size
176KB
-
MD5
bec704fd9c74a1fa792bcc7f8952a740
-
SHA1
9fbbc8bd8b4f7d493b5b8a86cddb106cb082d02d
-
SHA256
317c67a7cb21efecae972b2e74d5bddaa5d19f3db0ad094b64b6225df21b2881
-
SHA512
20a834ae27f8f81017eed7e5de40a3103d5884f205d1f18c7dba25e02a58c7aca0c742533c7ad8cb69122d0f458f54f7061e29ff00adb7c89c8a47bd9ad9d072
-
SSDEEP
3072:DXzv+WutGMFzS7f6nc46WmiJQm7Uj6iJez3YQ+pJza2qQwyU1kADDVi4H:3L0/gCPxrJAAzIpZa2K11i4H
Score10/10-
Modifies WinLogon for persistence
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops file in Drivers directory
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Looks for VMWare Tools registry key
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1