General
-
Target
3e5915720d6aa754d95aa4d0e4d8cc56_JaffaCakes118
-
Size
1.1MB
-
Sample
241013-hdwlpatcqc
-
MD5
3e5915720d6aa754d95aa4d0e4d8cc56
-
SHA1
7e640ae87de3494ac332655fd0adf5dad8a42d45
-
SHA256
e0c3258973b350481a9fb8b81499fd442392b0a96251c6acf74d96bc392e647f
-
SHA512
202c95905de538c8363f3ae58777f602fdb8c1b292cfbd35586facaa50f0d1b4700a57483b1b13a336a035735f3c064344d3e21094da96205a4949f21d6b0a94
-
SSDEEP
12288:XW1J7VLkr0kIrCn808V60ZLgojXmjIlzurjusk4UC28/pe7qQXoWAb103naygvjg:MJm8NZLxWbSofGovrs/OnkV/1
Static task
static1
Behavioral task
behavioral1
Sample
3e5915720d6aa754d95aa4d0e4d8cc56_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
3e5915720d6aa754d95aa4d0e4d8cc56_JaffaCakes118
-
Size
1.1MB
-
MD5
3e5915720d6aa754d95aa4d0e4d8cc56
-
SHA1
7e640ae87de3494ac332655fd0adf5dad8a42d45
-
SHA256
e0c3258973b350481a9fb8b81499fd442392b0a96251c6acf74d96bc392e647f
-
SHA512
202c95905de538c8363f3ae58777f602fdb8c1b292cfbd35586facaa50f0d1b4700a57483b1b13a336a035735f3c064344d3e21094da96205a4949f21d6b0a94
-
SSDEEP
12288:XW1J7VLkr0kIrCn808V60ZLgojXmjIlzurjusk4UC28/pe7qQXoWAb103naygvjg:MJm8NZLxWbSofGovrs/OnkV/1
-
Modifies firewall policy service
-
Modifies security service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4