General
-
Target
JaffaCakes118_51cf908178d2711d83eb1f4bba3bd202
-
Size
104KB
-
Sample
250129-c3a4dsyjhw
-
MD5
51cf908178d2711d83eb1f4bba3bd202
-
SHA1
333c2161b1530af4bd726754be0ca32d472c986f
-
SHA256
77605a9119c90c68b78b1502de1442565a529d92408dcf45e8b6833835ab092e
-
SHA512
4c8b6164431a8a55b73fe6629a7f7a803974bac7bb3fb38e6e2997137efb8a6ad901ffa5a653e01132b1a299a81a1fec7c6401e8a9868ae9d1eeba9c9d5cf84c
-
SSDEEP
3072:L4uvdzGfptdgPVKWVzc5jwaaHw7Koj4rRO71S:Opvg8WVzc05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_51cf908178d2711d83eb1f4bba3bd202.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_51cf908178d2711d83eb1f4bba3bd202
-
Size
104KB
-
MD5
51cf908178d2711d83eb1f4bba3bd202
-
SHA1
333c2161b1530af4bd726754be0ca32d472c986f
-
SHA256
77605a9119c90c68b78b1502de1442565a529d92408dcf45e8b6833835ab092e
-
SHA512
4c8b6164431a8a55b73fe6629a7f7a803974bac7bb3fb38e6e2997137efb8a6ad901ffa5a653e01132b1a299a81a1fec7c6401e8a9868ae9d1eeba9c9d5cf84c
-
SSDEEP
3072:L4uvdzGfptdgPVKWVzc5jwaaHw7Koj4rRO71S:Opvg8WVzc05
-
Modifies WinLogon for persistence
-
Ramnit family
-
UAC bypass
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Modify Registry
4