General
-
Target
JaffaCakes118_030e197760c36c22979e6e607d6170cc
-
Size
104KB
-
Sample
250121-jjljcatkgn
-
MD5
030e197760c36c22979e6e607d6170cc
-
SHA1
18ebb88bdc0d0aba3fcddfc3a531ba4335d3d575
-
SHA256
718dc82f7e1cd1e520656322e6ff1f7ae548e9383855a0158f8aabb47ed8f956
-
SHA512
45421a7438906139c866811167d7cdd0d82ab606010572c705de8fe90943920f200addf4ae3497fbd43ab16838e99c2c31a3e455d6448034bdb12d32608928c7
-
SSDEEP
3072:9gIpT1t2YXm8XdstQculie6qbcU5jwaaHw7Koj4rA:aIx1dX3XCt2bB
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_030e197760c36c22979e6e607d6170cc.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_030e197760c36c22979e6e607d6170cc
-
Size
104KB
-
MD5
030e197760c36c22979e6e607d6170cc
-
SHA1
18ebb88bdc0d0aba3fcddfc3a531ba4335d3d575
-
SHA256
718dc82f7e1cd1e520656322e6ff1f7ae548e9383855a0158f8aabb47ed8f956
-
SHA512
45421a7438906139c866811167d7cdd0d82ab606010572c705de8fe90943920f200addf4ae3497fbd43ab16838e99c2c31a3e455d6448034bdb12d32608928c7
-
SSDEEP
3072:9gIpT1t2YXm8XdstQculie6qbcU5jwaaHw7Koj4rA:aIx1dX3XCt2bB
-
Modifies WinLogon for persistence
-
Ramnit family
-
UAC bypass
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Modify Registry
4