General
-
Target
JaffaCakes118_489cc3553d4e7633408c6e99d53b0346
-
Size
136KB
-
Sample
250128-jwkskssqfj
-
MD5
489cc3553d4e7633408c6e99d53b0346
-
SHA1
5add5c4581743d1b72f186707b5a850cfe582fd9
-
SHA256
6c30a9e59bca447d2cddac9ec841eb2919c85a9296318ba546496221177c68a3
-
SHA512
3fb8b6c8b2aed1fb8e044f9f01f6da3c36bf253ea44a8ea3ab3a796d420f10bf8eccf085bc6a2d990f0cf5e16800cbce9d90697ab74c3d069ca4fc74255c0589
-
SSDEEP
3072:Cn4Ql7axPQNPTOZaE9HbKpVZrvkUgV8CSI8Yt4Ut868awWn:CnxaZQkR9HbSZTcVOOtA68BWn
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_489cc3553d4e7633408c6e99d53b0346.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
JaffaCakes118_489cc3553d4e7633408c6e99d53b0346
-
Size
136KB
-
MD5
489cc3553d4e7633408c6e99d53b0346
-
SHA1
5add5c4581743d1b72f186707b5a850cfe582fd9
-
SHA256
6c30a9e59bca447d2cddac9ec841eb2919c85a9296318ba546496221177c68a3
-
SHA512
3fb8b6c8b2aed1fb8e044f9f01f6da3c36bf253ea44a8ea3ab3a796d420f10bf8eccf085bc6a2d990f0cf5e16800cbce9d90697ab74c3d069ca4fc74255c0589
-
SSDEEP
3072:Cn4Ql7axPQNPTOZaE9HbKpVZrvkUgV8CSI8Yt4Ut868awWn:CnxaZQkR9HbSZTcVOOtA68BWn
-
Modifies WinLogon for persistence
-
Ramnit family
-
UAC bypass
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5