General
-
Target
f599abb1bd76636cd689728e6e40b7cc_JaffaCakes118
-
Size
200KB
-
Sample
241215-y3vzfsvrhs
-
MD5
f599abb1bd76636cd689728e6e40b7cc
-
SHA1
c842f02dba8e6ccb2d2e5daa6cb736ad4b76d9b9
-
SHA256
17338a454f7baf5f73b7ff7a65e322e328f0dc192b3de8e50d9a0205fc8cd57f
-
SHA512
cd325d43649cf4fb575d503b2edd1c47f56bbf6103ea186374680dd1d085f6947a9080599cce6a6e9627db9d452447ad63f4f080423e0672d3504b2dd2f0e72e
-
SSDEEP
3072:DpNFkmhDDo7QFDE5ICjmYq8Uh+cjTm9KpZQqekhwrjm2IHd/2pzl:ltAbJq8UHjTm9KYSwW1ep
Static task
static1
Behavioral task
behavioral1
Sample
f599abb1bd76636cd689728e6e40b7cc_JaffaCakes118.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
f599abb1bd76636cd689728e6e40b7cc_JaffaCakes118
-
Size
200KB
-
MD5
f599abb1bd76636cd689728e6e40b7cc
-
SHA1
c842f02dba8e6ccb2d2e5daa6cb736ad4b76d9b9
-
SHA256
17338a454f7baf5f73b7ff7a65e322e328f0dc192b3de8e50d9a0205fc8cd57f
-
SHA512
cd325d43649cf4fb575d503b2edd1c47f56bbf6103ea186374680dd1d085f6947a9080599cce6a6e9627db9d452447ad63f4f080423e0672d3504b2dd2f0e72e
-
SSDEEP
3072:DpNFkmhDDo7QFDE5ICjmYq8Uh+cjTm9KpZQqekhwrjm2IHd/2pzl:ltAbJq8UHjTm9KYSwW1ep
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Ramnit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
9