General
-
Target
1b6537ae64500c77c2b93b735f43fb1d_JaffaCakes118
-
Size
242KB
-
Sample
241007-eprkbsvcqq
-
MD5
1b6537ae64500c77c2b93b735f43fb1d
-
SHA1
4a003a845296ff0bdee4c8b912f589423e8c0557
-
SHA256
c3e2d48e11b7ef5a7c8900321cc0c56c2b95b392c31bc9ae09d5e1a81e6ee0d9
-
SHA512
5ba630092fc86088b40cab3df710565595821f5d9cba39673d0efad2994d1c543471b73630d36db06979c44ca58555ad4fcd1dfa071bc8ec3935ed69f75454f8
-
SSDEEP
6144:11iJcYtR1HsvpSHY7KoSrfTNBuzZZcA1wnOLrMM4V:1kHcpSHY7VSrfT2/czO3H
Behavioral task
behavioral1
Sample
1b6537ae64500c77c2b93b735f43fb1d_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
1b6537ae64500c77c2b93b735f43fb1d_JaffaCakes118
-
Size
242KB
-
MD5
1b6537ae64500c77c2b93b735f43fb1d
-
SHA1
4a003a845296ff0bdee4c8b912f589423e8c0557
-
SHA256
c3e2d48e11b7ef5a7c8900321cc0c56c2b95b392c31bc9ae09d5e1a81e6ee0d9
-
SHA512
5ba630092fc86088b40cab3df710565595821f5d9cba39673d0efad2994d1c543471b73630d36db06979c44ca58555ad4fcd1dfa071bc8ec3935ed69f75454f8
-
SSDEEP
6144:11iJcYtR1HsvpSHY7KoSrfTNBuzZZcA1wnOLrMM4V:1kHcpSHY7VSrfT2/czO3H
-
Modifies WinLogon for persistence
-
Drops file in Drivers directory
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1