General
-
Target
JaffaCakes118_3f8662ad947ff598de725c8c3bcef38e
-
Size
99KB
-
Sample
250127-pjyrkaxrfz
-
MD5
3f8662ad947ff598de725c8c3bcef38e
-
SHA1
bd6368f8c90ef3a1ea1326e569f63a48664be195
-
SHA256
53d20b78de7d457a68d0f840f4e3eeea5c74d501704041350a4f0a8e86b1032f
-
SHA512
f77b35efcedf3a460e19ba8afb68252876b6b7f7b49744a039c23b092e3910c4ae8bf09dc41a6c8bf4108b0ac8b6cb8a0dbd2ab606ed5b7fd073a733939904dd
-
SSDEEP
3072:ZWsrhZ35eU3ngJQ/cVVPOr9gsfUIpPaaHw7Koj4rtd:ZbtZ75/cVVmF
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3f8662ad947ff598de725c8c3bcef38e.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
JaffaCakes118_3f8662ad947ff598de725c8c3bcef38e
-
Size
99KB
-
MD5
3f8662ad947ff598de725c8c3bcef38e
-
SHA1
bd6368f8c90ef3a1ea1326e569f63a48664be195
-
SHA256
53d20b78de7d457a68d0f840f4e3eeea5c74d501704041350a4f0a8e86b1032f
-
SHA512
f77b35efcedf3a460e19ba8afb68252876b6b7f7b49744a039c23b092e3910c4ae8bf09dc41a6c8bf4108b0ac8b6cb8a0dbd2ab606ed5b7fd073a733939904dd
-
SSDEEP
3072:ZWsrhZ35eU3ngJQ/cVVPOr9gsfUIpPaaHw7Koj4rtd:ZbtZ75/cVVmF
-
Modifies WinLogon for persistence
-
Ramnit family
-
UAC bypass
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5