General
-
Target
45a7e70ef28d9d8504c5bd72ba13f3be_JaffaCakes118
-
Size
264KB
-
Sample
241015-d79cesxank
-
MD5
45a7e70ef28d9d8504c5bd72ba13f3be
-
SHA1
573a04603fdc55e04307727dd3816f316b894680
-
SHA256
6a95367b492ae4c76fcba7778a7f5bd6a4161840eb44f7f57ac895e2c73f835b
-
SHA512
fb4e701a2944d208a2a9904f894450fa7fb66b40cb7e0f19964866768e62f50569acee4e04c2ecbb8008eaeea122ca62d587f6a31f677f3bb48fa34359fda2eb
-
SSDEEP
6144:sBDPC5+0V/3U5xifUntIIHFteqMTENVYvKMyHhRE4adf3aGfrfiFOl:sp++0V/3ojtsqMTEsvm4DikbiUl
Static task
static1
Behavioral task
behavioral1
Sample
45a7e70ef28d9d8504c5bd72ba13f3be_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
45a7e70ef28d9d8504c5bd72ba13f3be_JaffaCakes118
-
Size
264KB
-
MD5
45a7e70ef28d9d8504c5bd72ba13f3be
-
SHA1
573a04603fdc55e04307727dd3816f316b894680
-
SHA256
6a95367b492ae4c76fcba7778a7f5bd6a4161840eb44f7f57ac895e2c73f835b
-
SHA512
fb4e701a2944d208a2a9904f894450fa7fb66b40cb7e0f19964866768e62f50569acee4e04c2ecbb8008eaeea122ca62d587f6a31f677f3bb48fa34359fda2eb
-
SSDEEP
6144:sBDPC5+0V/3U5xifUntIIHFteqMTENVYvKMyHhRE4adf3aGfrfiFOl:sp++0V/3ojtsqMTEsvm4DikbiUl
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5