General
-
Target
JaffaCakes118_195a5e165d073ee32294b656a025f18a
-
Size
118KB
-
Sample
250123-vnkndsxrej
-
MD5
195a5e165d073ee32294b656a025f18a
-
SHA1
26da4eb0f7cbf980fd15de2e804580a2e3828fdd
-
SHA256
50baca2451905a67aabb00f1bc7c9c0ca78a8081982e28c4b1727a32889437f4
-
SHA512
babc59c9a6b5c342c253109f81d5ee3b371521ab5f78458ca0a5539ddb73293fba2a174c9f2609fef14db5091c68dc0272a2edd9bf31be842dab9021de29c742
-
SSDEEP
3072:vg+3fh/PHrgNUqOBx4J2vNbGfvGnd3gW5ZM4/uBn1:o+3fRb9NdndPZMTD
Behavioral task
behavioral1
Sample
JaffaCakes118_195a5e165d073ee32294b656a025f18a.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
JaffaCakes118_195a5e165d073ee32294b656a025f18a
-
Size
118KB
-
MD5
195a5e165d073ee32294b656a025f18a
-
SHA1
26da4eb0f7cbf980fd15de2e804580a2e3828fdd
-
SHA256
50baca2451905a67aabb00f1bc7c9c0ca78a8081982e28c4b1727a32889437f4
-
SHA512
babc59c9a6b5c342c253109f81d5ee3b371521ab5f78458ca0a5539ddb73293fba2a174c9f2609fef14db5091c68dc0272a2edd9bf31be842dab9021de29c742
-
SSDEEP
3072:vg+3fh/PHrgNUqOBx4J2vNbGfvGnd3gW5ZM4/uBn1:o+3fRb9NdndPZMTD
-
Modifies WinLogon for persistence
-
Ramnit family
-
UAC bypass
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Modify Registry
4