General
-
Target
JaffaCakes118_2a8b5d1b104634099e0626369b4a0d73
-
Size
179KB
-
Sample
250125-l3mlvsxqfz
-
MD5
2a8b5d1b104634099e0626369b4a0d73
-
SHA1
c94ec018ae1aa116dab97c2b7286c38f99f0f393
-
SHA256
d421eef701a66ab0b3971de6e995c73bce58dde4b1f9ed078062d8411bc0a36d
-
SHA512
1f5abedcbdbfdfd0d9d08e1d72d2fb4a73ba7310892e73861096f56ee607564624f0b18edc06c4b9993f39fae7c40599b322d26c857bf40aa2045f8f2ff18e67
-
SSDEEP
3072:4o1WTnBL5WBLoD/prG6QJ7Wo3fyKa58PkJypyGrc9RdXp:4wWTnB8+/prGFwo3fyC5pyGm
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2a8b5d1b104634099e0626369b4a0d73.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
JaffaCakes118_2a8b5d1b104634099e0626369b4a0d73
-
Size
179KB
-
MD5
2a8b5d1b104634099e0626369b4a0d73
-
SHA1
c94ec018ae1aa116dab97c2b7286c38f99f0f393
-
SHA256
d421eef701a66ab0b3971de6e995c73bce58dde4b1f9ed078062d8411bc0a36d
-
SHA512
1f5abedcbdbfdfd0d9d08e1d72d2fb4a73ba7310892e73861096f56ee607564624f0b18edc06c4b9993f39fae7c40599b322d26c857bf40aa2045f8f2ff18e67
-
SSDEEP
3072:4o1WTnBL5WBLoD/prG6QJ7Wo3fyKa58PkJypyGrc9RdXp:4wWTnB8+/prGFwo3fyC5pyGm
-
Modifies WinLogon for persistence
-
Ramnit family
-
UAC bypass
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4