General
-
Target
JaffaCakes118_60a08bd5e8aba152f80bd94b017a1af0
-
Size
357KB
-
Sample
250101-zssxsawnak
-
MD5
60a08bd5e8aba152f80bd94b017a1af0
-
SHA1
0d63970524bcb68a2b13cd063d67e7115aa13882
-
SHA256
c7e035548267cd6502e23d30f834af95e03bd1ee2af8df1c27d0409995256ab6
-
SHA512
8c7f94cc2b7fb925dc4a55a36d0b30a91a157cabe2bd4ab3ac819e77900679a4a2880617d3dc5fe5ef8e3179a9c08fae6bbe48cc94d799c0c3f15eb42c8d7c10
-
SSDEEP
6144:SqHGoq/TMz7GQVONhSdnCsyJ6yzmmCXTl9xGUkKjDR:S4dNHGeOeAsuzzYXTEUkK3R
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_60a08bd5e8aba152f80bd94b017a1af0.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
JaffaCakes118_60a08bd5e8aba152f80bd94b017a1af0
-
Size
357KB
-
MD5
60a08bd5e8aba152f80bd94b017a1af0
-
SHA1
0d63970524bcb68a2b13cd063d67e7115aa13882
-
SHA256
c7e035548267cd6502e23d30f834af95e03bd1ee2af8df1c27d0409995256ab6
-
SHA512
8c7f94cc2b7fb925dc4a55a36d0b30a91a157cabe2bd4ab3ac819e77900679a4a2880617d3dc5fe5ef8e3179a9c08fae6bbe48cc94d799c0c3f15eb42c8d7c10
-
SSDEEP
6144:SqHGoq/TMz7GQVONhSdnCsyJ6yzmmCXTl9xGUkKjDR:S4dNHGeOeAsuzzYXTEUkK3R
-
Modifies WinLogon for persistence
-
Ramnit family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4