General
-
Target
1ebcdb989d921e9de8a808fab60427d6_JaffaCakes118
-
Size
542KB
-
Sample
241008-bba4msvdne
-
MD5
1ebcdb989d921e9de8a808fab60427d6
-
SHA1
7c67bc1cf2bddd1b418292d2035b20a23beb8ffb
-
SHA256
6a64a1c650046f3e10333065431f147e9bbf244f1c981a4fa5e4009824fc00e4
-
SHA512
2de1fc61fa64aa95b4fbe37b737b0b01254defaf43c11bf8b425688f4a31de6e43d2a89312270fa873233200acb434f7fb2db351f28b3e74e67e9397e46e2770
-
SSDEEP
12288:UZeVQkTrvj4v8cTUlkQPYv/95LRnbB2EivottfEsjfhNcMv4:UwQkTf4v8cjLRngJv27rIq4
Static task
static1
Behavioral task
behavioral1
Sample
1ebcdb989d921e9de8a808fab60427d6_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
latentbot
sectorclear1.zapto.org
Targets
-
-
Target
1ebcdb989d921e9de8a808fab60427d6_JaffaCakes118
-
Size
542KB
-
MD5
1ebcdb989d921e9de8a808fab60427d6
-
SHA1
7c67bc1cf2bddd1b418292d2035b20a23beb8ffb
-
SHA256
6a64a1c650046f3e10333065431f147e9bbf244f1c981a4fa5e4009824fc00e4
-
SHA512
2de1fc61fa64aa95b4fbe37b737b0b01254defaf43c11bf8b425688f4a31de6e43d2a89312270fa873233200acb434f7fb2db351f28b3e74e67e9397e46e2770
-
SSDEEP
12288:UZeVQkTrvj4v8cTUlkQPYv/95LRnbB2EivottfEsjfhNcMv4:UwQkTf4v8cjLRngJv27rIq4
-
Modifies WinLogon for persistence
-
Disables Task Manager via registry modification
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1