General
-
Target
JaffaCakes118_06db41b721e1246296e1c843e8c7d45f
-
Size
88KB
-
Sample
250121-xyc3eaxrcp
-
MD5
06db41b721e1246296e1c843e8c7d45f
-
SHA1
086a7624bbd687464e774f98319231085e546b08
-
SHA256
613cdeff6c365ea39e58f722711773f2febe924934e6bf0a371787805d61c5ce
-
SHA512
7a0d4c9ceffcdbdb7173c9f27e9f96ec109fa3747f0312b4312870c69db38e4355ce58b6aa8c931ffc77d397145cca87fa0d4d2e0810a6714dae4256c1c33f90
-
SSDEEP
1536:6BEDCYVNY2gtagBbAHZ8PG5Ekk8jwaaHw7Koj4rDk9PVRe6ZK:+4VSRoUcHiGVk8jwaaHw7Koj4rDk9PZ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_06db41b721e1246296e1c843e8c7d45f.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
JaffaCakes118_06db41b721e1246296e1c843e8c7d45f
-
Size
88KB
-
MD5
06db41b721e1246296e1c843e8c7d45f
-
SHA1
086a7624bbd687464e774f98319231085e546b08
-
SHA256
613cdeff6c365ea39e58f722711773f2febe924934e6bf0a371787805d61c5ce
-
SHA512
7a0d4c9ceffcdbdb7173c9f27e9f96ec109fa3747f0312b4312870c69db38e4355ce58b6aa8c931ffc77d397145cca87fa0d4d2e0810a6714dae4256c1c33f90
-
SSDEEP
1536:6BEDCYVNY2gtagBbAHZ8PG5Ekk8jwaaHw7Koj4rDk9PVRe6ZK:+4VSRoUcHiGVk8jwaaHw7Koj4rDk9PZ
-
Modifies WinLogon for persistence
-
Ramnit family
-
UAC bypass
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Modify Registry
4