General
-
Target
433de5f365427f0050c03bbdc0743eba_JaffaCakes118
-
Size
340KB
-
Sample
241014-vj2q4swblb
-
MD5
433de5f365427f0050c03bbdc0743eba
-
SHA1
125d358f3e8b0dac7d34342949a317e78518ac52
-
SHA256
314eca135f6a094d3e919a2242db81822caae45651b5d452caba587a8be4b5bf
-
SHA512
480aeff5b5794bbdbd66af87e5d760bedbb16869ec6bd3e6ff5111e201d43cc7619ad1e83d2c95598c59f7d6320cf9b683be51cf11ec87266b6725f5f754a2d8
-
SSDEEP
6144:s1iJcYtR1HsvpSHY7KoSrfTNBuzZZcA1wnOLrMM4qFd/S:skHcpSHY7VSrfT2/czO3HX6
Behavioral task
behavioral1
Sample
433de5f365427f0050c03bbdc0743eba_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
433de5f365427f0050c03bbdc0743eba_JaffaCakes118
-
Size
340KB
-
MD5
433de5f365427f0050c03bbdc0743eba
-
SHA1
125d358f3e8b0dac7d34342949a317e78518ac52
-
SHA256
314eca135f6a094d3e919a2242db81822caae45651b5d452caba587a8be4b5bf
-
SHA512
480aeff5b5794bbdbd66af87e5d760bedbb16869ec6bd3e6ff5111e201d43cc7619ad1e83d2c95598c59f7d6320cf9b683be51cf11ec87266b6725f5f754a2d8
-
SSDEEP
6144:s1iJcYtR1HsvpSHY7KoSrfTNBuzZZcA1wnOLrMM4qFd/S:skHcpSHY7VSrfT2/czO3HX6
-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1