General
-
Target
13f735d68f90da0698413b3157c4428d_JaffaCakes118
-
Size
1.2MB
-
Sample
241004-s6rtbawgrg
-
MD5
13f735d68f90da0698413b3157c4428d
-
SHA1
926d661dcff7df5a9faa109188283c60c8e303a4
-
SHA256
d8be370a81a4b4c726bdf1eb619ebce7b596d07415c77ab154cadeb7cffde1e6
-
SHA512
f32a2e083679cc154a7c5c892881724e7e575cf6af5f5c68290cffd1f6ae06025447f273d10434d4491afb5ee12137fa2893b80c939977dd4b2c619410849d28
-
SSDEEP
3072:RgDAWPCZabC3YUKRmjlItUj6CU5jwaaHw7Koj4rR:qD+8tUimjlIUja
Static task
static1
Behavioral task
behavioral1
Sample
13f735d68f90da0698413b3157c4428d_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
13f735d68f90da0698413b3157c4428d_JaffaCakes118
-
Size
1.2MB
-
MD5
13f735d68f90da0698413b3157c4428d
-
SHA1
926d661dcff7df5a9faa109188283c60c8e303a4
-
SHA256
d8be370a81a4b4c726bdf1eb619ebce7b596d07415c77ab154cadeb7cffde1e6
-
SHA512
f32a2e083679cc154a7c5c892881724e7e575cf6af5f5c68290cffd1f6ae06025447f273d10434d4491afb5ee12137fa2893b80c939977dd4b2c619410849d28
-
SSDEEP
3072:RgDAWPCZabC3YUKRmjlItUj6CU5jwaaHw7Koj4rR:qD+8tUimjlIUja
-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Modify Registry
4