General
-
Target
3f8186863141e36ce609292a3da36e83_JaffaCakes118
-
Size
233KB
-
Sample
241013-ne7cgatdnf
-
MD5
3f8186863141e36ce609292a3da36e83
-
SHA1
ed7d9833ec8ade66607286a79e2a10515f9f7625
-
SHA256
cc00f80a830956c5c1344742e632c9f057b283ded101dc0dd4fd9a7ea95d4017
-
SHA512
9050e6b0df8a4752d978288f809b992c6ff8eb5c6157b64a4776a040cdcb7a25068bc6425de5cd93e910826fce24d80416474f80f6acf8583339a7daf34016bc
-
SSDEEP
6144:/4CFfifD2gVKVTQQ249HZ52KTh9XKOCgLJacj5/AZtRs:/Xgr8VMQDT52WXKq9fj5/AZj
Behavioral task
behavioral1
Sample
3f8186863141e36ce609292a3da36e83_JaffaCakes118.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
3f8186863141e36ce609292a3da36e83_JaffaCakes118
-
Size
233KB
-
MD5
3f8186863141e36ce609292a3da36e83
-
SHA1
ed7d9833ec8ade66607286a79e2a10515f9f7625
-
SHA256
cc00f80a830956c5c1344742e632c9f057b283ded101dc0dd4fd9a7ea95d4017
-
SHA512
9050e6b0df8a4752d978288f809b992c6ff8eb5c6157b64a4776a040cdcb7a25068bc6425de5cd93e910826fce24d80416474f80f6acf8583339a7daf34016bc
-
SSDEEP
6144:/4CFfifD2gVKVTQQ249HZ52KTh9XKOCgLJacj5/AZtRs:/Xgr8VMQDT52WXKq9fj5/AZj
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4