General
-
Target
56fb8c0f7ca3207d097d99851a7394b5_JaffaCakes118
-
Size
796KB
-
Sample
241018-mq4kaasdnf
-
MD5
56fb8c0f7ca3207d097d99851a7394b5
-
SHA1
a405fc816bca78f200e72cc931865075fb8a8c90
-
SHA256
dbd3ebf94196b14f6b8fe7218649e98951f5f373ab7c4352e43a50a5da2d0eb6
-
SHA512
b30a03ab2644476b8cd8cafb41acca60db86fd735ed751ed96b31ef6c46fefe010530634be67ae390c9e548ccd5f3f3847ec33f6f145bdac6bfaf3ee69957e76
-
SSDEEP
12288:u+/7zemUO1HK5OLXlewvefLvIm1O+nMd/08RnFcaSjsBcbPOa1lQ12mleKfezNo/:B/2uK5OiLvPORdvRua4mcbPjTQkKe1m
Static task
static1
Behavioral task
behavioral1
Sample
56fb8c0f7ca3207d097d99851a7394b5_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
56fb8c0f7ca3207d097d99851a7394b5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
56fb8c0f7ca3207d097d99851a7394b5_JaffaCakes118
-
Size
796KB
-
MD5
56fb8c0f7ca3207d097d99851a7394b5
-
SHA1
a405fc816bca78f200e72cc931865075fb8a8c90
-
SHA256
dbd3ebf94196b14f6b8fe7218649e98951f5f373ab7c4352e43a50a5da2d0eb6
-
SHA512
b30a03ab2644476b8cd8cafb41acca60db86fd735ed751ed96b31ef6c46fefe010530634be67ae390c9e548ccd5f3f3847ec33f6f145bdac6bfaf3ee69957e76
-
SSDEEP
12288:u+/7zemUO1HK5OLXlewvefLvIm1O+nMd/08RnFcaSjsBcbPOa1lQ12mleKfezNo/:B/2uK5OiLvPORdvRua4mcbPjTQkKe1m
Score10/10-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1