General
-
Target
fd10d5881fbc2b6cbdc5b643d355b92b_JaffaCakes118
-
Size
101KB
-
Sample
241218-zl9lysskck
-
MD5
fd10d5881fbc2b6cbdc5b643d355b92b
-
SHA1
1c3ad1a1a546e479b53de31dac5cd4944783b406
-
SHA256
168fd5734ac0188a4f83e948abe0a7e95661137d8d8a5abc45071fe7b538fe28
-
SHA512
98c5a5bd27777712c1bb399f95d05b03bbe403ba502b0cc7275159046c9c2646b3f9166c222b92685297a7598e1f2c4962a1e2c40cd1a3b47e66100399018b0a
-
SSDEEP
3072:IHZoTWiIyhD6EuGf7sHwTL/Fk8jwaaHw7Koj4r3w:oZOWidRZf7sHK
Static task
static1
Behavioral task
behavioral1
Sample
fd10d5881fbc2b6cbdc5b643d355b92b_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
fd10d5881fbc2b6cbdc5b643d355b92b_JaffaCakes118
-
Size
101KB
-
MD5
fd10d5881fbc2b6cbdc5b643d355b92b
-
SHA1
1c3ad1a1a546e479b53de31dac5cd4944783b406
-
SHA256
168fd5734ac0188a4f83e948abe0a7e95661137d8d8a5abc45071fe7b538fe28
-
SHA512
98c5a5bd27777712c1bb399f95d05b03bbe403ba502b0cc7275159046c9c2646b3f9166c222b92685297a7598e1f2c4962a1e2c40cd1a3b47e66100399018b0a
-
SSDEEP
3072:IHZoTWiIyhD6EuGf7sHwTL/Fk8jwaaHw7Koj4r3w:oZOWidRZf7sHK
-
Modifies WinLogon for persistence
-
Ramnit family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Modify Registry
4