General
-
Target
09ed7344eee8f9318c7034a301ef3827_JaffaCakes118
-
Size
830KB
-
Sample
241002-k4cmlsyaml
-
MD5
09ed7344eee8f9318c7034a301ef3827
-
SHA1
e6ed7f3b871bd701452928f985b47366b6785e7d
-
SHA256
1dc9169b13668d93f8fee7110c7baab6489c711cd1b052c5bb4b9685840a0c9c
-
SHA512
0db16491e7fcca4ab72c7a2b6ee393b5e7e32a0eb4b7519d1bfaed3ad98a4a377ecae78aabcc87c6c52945f7ed2cb6fc7e41dbc73d76d9820ac01af7cfe9ecdf
-
SSDEEP
3072:rW5qzKL4+xaX2Qam6yYQkRwLWnmnqHfERw8PJxaR/tZn1/NXgmuq:S1D42SYQMwLWn6qE+8iR/tLKe
Static task
static1
Behavioral task
behavioral1
Sample
09ed7344eee8f9318c7034a301ef3827_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09ed7344eee8f9318c7034a301ef3827_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
09ed7344eee8f9318c7034a301ef3827_JaffaCakes118
-
Size
830KB
-
MD5
09ed7344eee8f9318c7034a301ef3827
-
SHA1
e6ed7f3b871bd701452928f985b47366b6785e7d
-
SHA256
1dc9169b13668d93f8fee7110c7baab6489c711cd1b052c5bb4b9685840a0c9c
-
SHA512
0db16491e7fcca4ab72c7a2b6ee393b5e7e32a0eb4b7519d1bfaed3ad98a4a377ecae78aabcc87c6c52945f7ed2cb6fc7e41dbc73d76d9820ac01af7cfe9ecdf
-
SSDEEP
3072:rW5qzKL4+xaX2Qam6yYQkRwLWnmnqHfERw8PJxaR/tZn1/NXgmuq:S1D42SYQMwLWn6qE+8iR/tLKe
Score10/10-
Modifies WinLogon for persistence
-
Modifies security service
-
Modifies visiblity of hidden/system files in Explorer
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
8