General
-
Target
19aa5640223a48f6447e6e8b8d82b909_JaffaCakes118
-
Size
620KB
-
Sample
241006-zly58azajd
-
MD5
19aa5640223a48f6447e6e8b8d82b909
-
SHA1
f0346a4ba413da9c55ac2b49b77ac7bd222cd97a
-
SHA256
66d669631c0011937b0f501d1b074449fbf8a1a2e78fee978e20c329ee59a0c6
-
SHA512
a13b857d1a5d54bd29933d64991ff809e7a3f64b2df139f473890c58c15ea66bc14dd1d80e3149439049d78a57a4cd53df0c2c2bf5e57ab84aa250eff76c17a1
-
SSDEEP
12288:sZeVQkTrvj4s70AgmXwiqQHbnJpaE3EAYVSFaaZjAIREsjfhNcMvU:swQkTf4xATgiqfE3E3VuTjTrIqU
Static task
static1
Behavioral task
behavioral1
Sample
19aa5640223a48f6447e6e8b8d82b909_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
19aa5640223a48f6447e6e8b8d82b909_JaffaCakes118
-
Size
620KB
-
MD5
19aa5640223a48f6447e6e8b8d82b909
-
SHA1
f0346a4ba413da9c55ac2b49b77ac7bd222cd97a
-
SHA256
66d669631c0011937b0f501d1b074449fbf8a1a2e78fee978e20c329ee59a0c6
-
SHA512
a13b857d1a5d54bd29933d64991ff809e7a3f64b2df139f473890c58c15ea66bc14dd1d80e3149439049d78a57a4cd53df0c2c2bf5e57ab84aa250eff76c17a1
-
SSDEEP
12288:sZeVQkTrvj4s70AgmXwiqQHbnJpaE3EAYVSFaaZjAIREsjfhNcMvU:swQkTf4xATgiqfE3E3VuTjTrIqU
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3