General
-
Target
edd3aebf6e54616a396dd25fec685534_JaffaCakes118
-
Size
456KB
-
Sample
240920-r78yjsseln
-
MD5
edd3aebf6e54616a396dd25fec685534
-
SHA1
ee778cf4a7206c44fe9dededb4e2628aebf30fd1
-
SHA256
3a1cdbe96d807a936a6ea813e09c838b759d35e59e73c9320fa43c38d8733ec4
-
SHA512
f4513a083f7bdb61e5d04304fe20fdac6e110821892a453674eeba8e9b5e859212058b3d7a3ab5d43def852baabb9cfc4792b37458e14e3492a68adc70117296
-
SSDEEP
12288:jEVXKpmokkif4JgTIoq43H2cE05nMx11DGkfb7i:jEtRsiAJgMe3H2cJCx1YOb7i
Static task
static1
Behavioral task
behavioral1
Sample
edd3aebf6e54616a396dd25fec685534_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
edd3aebf6e54616a396dd25fec685534_JaffaCakes118.exe
Resource
win10v2004-20240910-en
Malware Config
Targets
-
-
Target
edd3aebf6e54616a396dd25fec685534_JaffaCakes118
-
Size
456KB
-
MD5
edd3aebf6e54616a396dd25fec685534
-
SHA1
ee778cf4a7206c44fe9dededb4e2628aebf30fd1
-
SHA256
3a1cdbe96d807a936a6ea813e09c838b759d35e59e73c9320fa43c38d8733ec4
-
SHA512
f4513a083f7bdb61e5d04304fe20fdac6e110821892a453674eeba8e9b5e859212058b3d7a3ab5d43def852baabb9cfc4792b37458e14e3492a68adc70117296
-
SSDEEP
12288:jEVXKpmokkif4JgTIoq43H2cE05nMx11DGkfb7i:jEtRsiAJgMe3H2cJCx1YOb7i
Score10/10-
Modifies visiblity of hidden/system files in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Pre-OS Boot
1Bootkit
1