General
-
Target
JaffaCakes118_31f08e959ff212c200960e619b8cb494
-
Size
100KB
-
Sample
250126-dgt5ta1lhj
-
MD5
31f08e959ff212c200960e619b8cb494
-
SHA1
178dbd1a46d12386530fea2b4d04790b104b6316
-
SHA256
d464a3a24d069cd5c7d36d192131cd362edf309f3b577db3b6970d446f08a444
-
SHA512
1076b73307fe74c1551d0f83d222d4dc32bed3871e524a7193f3c625f5613fe2a5649f20988635e880ccf0ade76af87d87f3d69f569e6e2010cd051e47968b8b
-
SSDEEP
3072:lNDuhNig6LUD3DeCN6xvmBz/gxgGak8jwaaHw7Koj4rD8p2RPB:lNuF6LdwKALgxJGK
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_31f08e959ff212c200960e619b8cb494.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
JaffaCakes118_31f08e959ff212c200960e619b8cb494
-
Size
100KB
-
MD5
31f08e959ff212c200960e619b8cb494
-
SHA1
178dbd1a46d12386530fea2b4d04790b104b6316
-
SHA256
d464a3a24d069cd5c7d36d192131cd362edf309f3b577db3b6970d446f08a444
-
SHA512
1076b73307fe74c1551d0f83d222d4dc32bed3871e524a7193f3c625f5613fe2a5649f20988635e880ccf0ade76af87d87f3d69f569e6e2010cd051e47968b8b
-
SSDEEP
3072:lNDuhNig6LUD3DeCN6xvmBz/gxgGak8jwaaHw7Koj4rD8p2RPB:lNuF6LdwKALgxJGK
-
Modifies WinLogon for persistence
-
Ramnit family
-
UAC bypass
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Modify Registry
4