General
-
Target
7396739e8713e3e3e6f8917a9299c962_JaffaCakes118
-
Size
265KB
-
Sample
241024-n1mvyszfpk
-
MD5
7396739e8713e3e3e6f8917a9299c962
-
SHA1
ac141e09e479a5df8c78c56e2651f7b76e78c89e
-
SHA256
bcb2babada75a2347334673af4ab2f6af8cf8f38a0bdf278d0c43fd0dd80e05b
-
SHA512
1543c0b1ce4e3967b01c1ec00967f0a6d60a37737c310d1290a6963d088be99bea06d5a9004143ab839c22b789898c082623f2cbc69ed8d2d123de2d18dd7802
-
SSDEEP
6144:Td2d1hhrmXyrwlUdfcODhDg9MFagC47BOUUbJK0MMg:Tcd1hlwEWMFaV44dRg
Static task
static1
Behavioral task
behavioral1
Sample
7396739e8713e3e3e6f8917a9299c962_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
7396739e8713e3e3e6f8917a9299c962_JaffaCakes118
-
Size
265KB
-
MD5
7396739e8713e3e3e6f8917a9299c962
-
SHA1
ac141e09e479a5df8c78c56e2651f7b76e78c89e
-
SHA256
bcb2babada75a2347334673af4ab2f6af8cf8f38a0bdf278d0c43fd0dd80e05b
-
SHA512
1543c0b1ce4e3967b01c1ec00967f0a6d60a37737c310d1290a6963d088be99bea06d5a9004143ab839c22b789898c082623f2cbc69ed8d2d123de2d18dd7802
-
SSDEEP
6144:Td2d1hhrmXyrwlUdfcODhDg9MFagC47BOUUbJK0MMg:Tcd1hlwEWMFaV44dRg
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3