General
-
Target
JaffaCakes118_14832da4b9f1dec5c76a892a0b2272e2
-
Size
110KB
-
Sample
250123-g8kl8swrgz
-
MD5
14832da4b9f1dec5c76a892a0b2272e2
-
SHA1
0a2e783796683e92c55321e199a3ff2f76e01bdd
-
SHA256
6917dc0e5ccbc63326ee6468e208591136b5885c9a481c565c2b8290c4a7ab7d
-
SHA512
f62292963001858c2448650679b6d68a5d7bea47ea36d48392c033b8be46927b4dff31765a332b3b6f8645165899e1e45f35b83c9f0c1bd74b81da80131e80d2
-
SSDEEP
3072:wUC7Bb6nkkRdRePLaZPp19DfOqjwaaHw7Koj4r:zRXRePedBfO
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_14832da4b9f1dec5c76a892a0b2272e2.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
JaffaCakes118_14832da4b9f1dec5c76a892a0b2272e2
-
Size
110KB
-
MD5
14832da4b9f1dec5c76a892a0b2272e2
-
SHA1
0a2e783796683e92c55321e199a3ff2f76e01bdd
-
SHA256
6917dc0e5ccbc63326ee6468e208591136b5885c9a481c565c2b8290c4a7ab7d
-
SHA512
f62292963001858c2448650679b6d68a5d7bea47ea36d48392c033b8be46927b4dff31765a332b3b6f8645165899e1e45f35b83c9f0c1bd74b81da80131e80d2
-
SSDEEP
3072:wUC7Bb6nkkRdRePLaZPp19DfOqjwaaHw7Koj4r:zRXRePedBfO
-
Modifies WinLogon for persistence
-
Ramnit family
-
UAC bypass
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Modify Registry
4