General
-
Target
ed160a55ecc41b99343ddc8b5cc9e8c3_JaffaCakes118
-
Size
292KB
-
Sample
240920-h3dr6svdpp
-
MD5
ed160a55ecc41b99343ddc8b5cc9e8c3
-
SHA1
db1170f85a098fd064116e3058a63a4e8ffb6f85
-
SHA256
15b5733f69e263c6f53cad255c2f51add730968a04dc53a0fbc417ccaeee5234
-
SHA512
7eb71f24dfe52b1432612974093cc37f44bf8a3f6bd08e03208540521569663fd4129453443fa72e5cfb0742e8f7139c29bab6301bec9534a3cea99cc80be51e
-
SSDEEP
6144:OUKww65rAi1mVfURzQlVqVz/pkME1gkNG7Lns2O:OUKzqB1mVfaMahBkTG7Q2O
Static task
static1
Behavioral task
behavioral1
Sample
ed160a55ecc41b99343ddc8b5cc9e8c3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed160a55ecc41b99343ddc8b5cc9e8c3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ed160a55ecc41b99343ddc8b5cc9e8c3_JaffaCakes118
-
Size
292KB
-
MD5
ed160a55ecc41b99343ddc8b5cc9e8c3
-
SHA1
db1170f85a098fd064116e3058a63a4e8ffb6f85
-
SHA256
15b5733f69e263c6f53cad255c2f51add730968a04dc53a0fbc417ccaeee5234
-
SHA512
7eb71f24dfe52b1432612974093cc37f44bf8a3f6bd08e03208540521569663fd4129453443fa72e5cfb0742e8f7139c29bab6301bec9534a3cea99cc80be51e
-
SSDEEP
6144:OUKww65rAi1mVfURzQlVqVz/pkME1gkNG7Lns2O:OUKzqB1mVfaMahBkTG7Q2O
Score10/10-
Modifies firewall policy service
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7Pre-OS Boot
1Bootkit
1