General

  • Target

    f63b7497e3513c23f8ab476daff4262a_JaffaCakes118

  • Size

    113KB

  • Sample

    241215-3hmjsssmet

  • MD5

    f63b7497e3513c23f8ab476daff4262a

  • SHA1

    6f58c0df4b5a2f892ba36f30ac30d99a38ae8ba5

  • SHA256

    ca5d1bf0f6290a2097c77932217daa89f92b05c3438f4dea0a216d8f55090bd7

  • SHA512

    cab5cb89eb73fd61a1e25d4ee5f76e28646cca38d8bfe10c973218011dede11b8266662a4c27a175d00b1ccaed746c25e09f8d13b123872eceafa4b61f1a9b85

  • SSDEEP

    3072:YOoJHQP6teA/2J3JmoqOX71x4J2vNbGfvGnd3gW5ZM4/une:4HPA3t9NdndPZMTe

Malware Config

Targets

    • Target

      f63b7497e3513c23f8ab476daff4262a_JaffaCakes118

    • Size

      113KB

    • MD5

      f63b7497e3513c23f8ab476daff4262a

    • SHA1

      6f58c0df4b5a2f892ba36f30ac30d99a38ae8ba5

    • SHA256

      ca5d1bf0f6290a2097c77932217daa89f92b05c3438f4dea0a216d8f55090bd7

    • SHA512

      cab5cb89eb73fd61a1e25d4ee5f76e28646cca38d8bfe10c973218011dede11b8266662a4c27a175d00b1ccaed746c25e09f8d13b123872eceafa4b61f1a9b85

    • SSDEEP

      3072:YOoJHQP6teA/2J3JmoqOX71x4J2vNbGfvGnd3gW5ZM4/une:4HPA3t9NdndPZMTe

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks