General
-
Target
ec84d2f90193a2217ed2ccd2feec9d4b_JaffaCakes118
-
Size
576KB
-
Sample
240920-a8mm9szfkb
-
MD5
ec84d2f90193a2217ed2ccd2feec9d4b
-
SHA1
907e912ecf8e741b6ef6bcf190d157c4b52f1994
-
SHA256
0a8a9b0025e81b6188a01e87638c65d0d7da274a13e8b3c678f0398f3c7e8331
-
SHA512
e96762edac1f78603c88a31a83334165fcd229aa5e320e93f29833fb6c3e7c0fe0009bdf330db45015585ab6cfc38edceeabeb4598c76595cf37282afbe52a7d
-
SSDEEP
6144:A1QMivgpQ25+yApTCg3cz6ufWeLuIrybTQg9o214QTB2I/51pftDKHpDbU69SWvT:wQMiG+2gef5x/xQTB2OfDKC7Wgcxp
Static task
static1
Behavioral task
behavioral1
Sample
ec84d2f90193a2217ed2ccd2feec9d4b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec84d2f90193a2217ed2ccd2feec9d4b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ec84d2f90193a2217ed2ccd2feec9d4b_JaffaCakes118
-
Size
576KB
-
MD5
ec84d2f90193a2217ed2ccd2feec9d4b
-
SHA1
907e912ecf8e741b6ef6bcf190d157c4b52f1994
-
SHA256
0a8a9b0025e81b6188a01e87638c65d0d7da274a13e8b3c678f0398f3c7e8331
-
SHA512
e96762edac1f78603c88a31a83334165fcd229aa5e320e93f29833fb6c3e7c0fe0009bdf330db45015585ab6cfc38edceeabeb4598c76595cf37282afbe52a7d
-
SSDEEP
6144:A1QMivgpQ25+yApTCg3cz6ufWeLuIrybTQg9o214QTB2I/51pftDKHpDbU69SWvT:wQMiG+2gef5x/xQTB2OfDKC7Wgcxp
-
Modifies WinLogon for persistence
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Modify Registry
5