General
-
Target
40399abf2fd406ffe2b6243026cb79a1_JaffaCakes118
-
Size
741KB
-
Sample
241013-q7pn8svblj
-
MD5
40399abf2fd406ffe2b6243026cb79a1
-
SHA1
64388c49d752237ec715a319691864113d5faa34
-
SHA256
a4bdc360927c533b38e388c2dbce77dda3f03793557408fdf06f1935dc9cca80
-
SHA512
184915fbc8f44bf714bcd270e3c61b9e9778bec3877bea216f0858a72ca2aadb4cf9ef5ddf973e1b0d678e1a3dd4fe4fa8e5d2dc25bc7d0333017eba447355bd
-
SSDEEP
12288:UQkPrGW1QBtr6wk8KNv0l/sd6QJdi39MujlaXIU7I0UxjjEILY:UZD03RwvS/K62i39Mujos0gE
Static task
static1
Behavioral task
behavioral1
Sample
40399abf2fd406ffe2b6243026cb79a1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40399abf2fd406ffe2b6243026cb79a1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
40399abf2fd406ffe2b6243026cb79a1_JaffaCakes118
-
Size
741KB
-
MD5
40399abf2fd406ffe2b6243026cb79a1
-
SHA1
64388c49d752237ec715a319691864113d5faa34
-
SHA256
a4bdc360927c533b38e388c2dbce77dda3f03793557408fdf06f1935dc9cca80
-
SHA512
184915fbc8f44bf714bcd270e3c61b9e9778bec3877bea216f0858a72ca2aadb4cf9ef5ddf973e1b0d678e1a3dd4fe4fa8e5d2dc25bc7d0333017eba447355bd
-
SSDEEP
12288:UQkPrGW1QBtr6wk8KNv0l/sd6QJdi39MujlaXIU7I0UxjjEILY:UZD03RwvS/K62i39Mujos0gE
Score10/10-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1