General
-
Target
d607dc520a218010b46f50ddfa2c87b4_JaffaCakes118
-
Size
397KB
-
Sample
240909-lcfqma1dlj
-
MD5
d607dc520a218010b46f50ddfa2c87b4
-
SHA1
ba28c41b9452f396e3f9acd52094c128e27ef398
-
SHA256
651ab623fd17c7f10d52327cc1421d97e8e099e0b044ab8870f175cdcc0ad839
-
SHA512
0024af340622678b55cb776cde474c8ad01eff624162282907be9a58012e526aff469eec0716f9a7495a7cef4f83f72868948cb0d1beba3215aba13cc346a820
-
SSDEEP
12288:ewNZEWXpjmtW2ebrUSLhbjuQbbPsCDREpjCi:WWXpWvsrU2JuMREpjCi
Static task
static1
Behavioral task
behavioral1
Sample
d607dc520a218010b46f50ddfa2c87b4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d607dc520a218010b46f50ddfa2c87b4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
d607dc520a218010b46f50ddfa2c87b4_JaffaCakes118
-
Size
397KB
-
MD5
d607dc520a218010b46f50ddfa2c87b4
-
SHA1
ba28c41b9452f396e3f9acd52094c128e27ef398
-
SHA256
651ab623fd17c7f10d52327cc1421d97e8e099e0b044ab8870f175cdcc0ad839
-
SHA512
0024af340622678b55cb776cde474c8ad01eff624162282907be9a58012e526aff469eec0716f9a7495a7cef4f83f72868948cb0d1beba3215aba13cc346a820
-
SSDEEP
12288:ewNZEWXpjmtW2ebrUSLhbjuQbbPsCDREpjCi:WWXpWvsrU2JuMREpjCi
-
Modifies firewall policy service
-
Blocklisted process makes network request
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
2Disable or Modify Tools
1Modify Registry
4