General
-
Target
00e435496590b9c712d89945b07f6516_JaffaCakes118
-
Size
678KB
-
Sample
240930-mnztbazgqm
-
MD5
00e435496590b9c712d89945b07f6516
-
SHA1
16e228317389dcf11196e75ad4910a46a9d664de
-
SHA256
eab44c4bf6f2b14afb77c92fe3b509f33d6195312438d399005422982f33cc16
-
SHA512
46fb5eb6cdf6b3f2a0861ff6d18c15acd17504a6602ff1caa0d8b57e30b1d9a4075791ed64efac6669158fd5514b98c6bdeebe6fa25873e5971634e3fdb33c46
-
SSDEEP
12288:TJTFIIhIIIuFKEBIYVMgqtYrsSialzYCvhNxVV0Okcb5L:TSE6YmYgbaxH1l
Static task
static1
Behavioral task
behavioral1
Sample
00e435496590b9c712d89945b07f6516_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
latentbot
tommiserver.zapto.org
Targets
-
-
Target
00e435496590b9c712d89945b07f6516_JaffaCakes118
-
Size
678KB
-
MD5
00e435496590b9c712d89945b07f6516
-
SHA1
16e228317389dcf11196e75ad4910a46a9d664de
-
SHA256
eab44c4bf6f2b14afb77c92fe3b509f33d6195312438d399005422982f33cc16
-
SHA512
46fb5eb6cdf6b3f2a0861ff6d18c15acd17504a6602ff1caa0d8b57e30b1d9a4075791ed64efac6669158fd5514b98c6bdeebe6fa25873e5971634e3fdb33c46
-
SSDEEP
12288:TJTFIIhIIIuFKEBIYVMgqtYrsSialzYCvhNxVV0Okcb5L:TSE6YmYgbaxH1l
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
7