General
-
Target
69b1f8ff1e49b78c12fa6657cdef2017_JaffaCakes118
-
Size
986KB
-
Sample
241022-keytjswela
-
MD5
69b1f8ff1e49b78c12fa6657cdef2017
-
SHA1
a6a9eaa541afbf63dbe34e14b39c50f6c89fda14
-
SHA256
01b69d1f321f028ced66f438204789ef1327aa7fd69619b5840994362fb50510
-
SHA512
15875b5ee05a797fdb6a298c8b558b7d4855d9f715bdbda85236ac55aa34128a22b64d0eb683393aa371d744f956f59682b6120abb809f6eac9bf5c86632cb15
-
SSDEEP
24576:w+UD04MRHFqK4VST/xVXJ9k2Ni3n8qcQ6fySiI:f4MRHF6VWxFvkcikQ1DI
Static task
static1
Behavioral task
behavioral1
Sample
69b1f8ff1e49b78c12fa6657cdef2017_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
69b1f8ff1e49b78c12fa6657cdef2017_JaffaCakes118
-
Size
986KB
-
MD5
69b1f8ff1e49b78c12fa6657cdef2017
-
SHA1
a6a9eaa541afbf63dbe34e14b39c50f6c89fda14
-
SHA256
01b69d1f321f028ced66f438204789ef1327aa7fd69619b5840994362fb50510
-
SHA512
15875b5ee05a797fdb6a298c8b558b7d4855d9f715bdbda85236ac55aa34128a22b64d0eb683393aa371d744f956f59682b6120abb809f6eac9bf5c86632cb15
-
SSDEEP
24576:w+UD04MRHFqK4VST/xVXJ9k2Ni3n8qcQ6fySiI:f4MRHF6VWxFvkcikQ1DI
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables Task Manager via registry modification
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
7