General
-
Target
JaffaCakes118_586e7256272c1ee325f049653ae2dafc
-
Size
117KB
-
Sample
250129-svc6sa1ngw
-
MD5
586e7256272c1ee325f049653ae2dafc
-
SHA1
094f31c990c1a803e326b58327683abacb967b90
-
SHA256
fd17803f82f1409122725fd560dc0257cfd8fa47f4ad892c80609503cf02cff6
-
SHA512
d96094aa3981a7f32559d9a9fd7def8feeaa021ea16b6f02c0d89bc856743a8c83611544ea181d3326f2e656ab59da4e15b09c5a7f195283b16d15794a8efcf5
-
SSDEEP
3072:vDSKiauBZz/DhceNw1OTw+XIU5jwaaHw7Koj4rBnRM:rSKbwhdcqYIhXNAn6
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_586e7256272c1ee325f049653ae2dafc.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_586e7256272c1ee325f049653ae2dafc
-
Size
117KB
-
MD5
586e7256272c1ee325f049653ae2dafc
-
SHA1
094f31c990c1a803e326b58327683abacb967b90
-
SHA256
fd17803f82f1409122725fd560dc0257cfd8fa47f4ad892c80609503cf02cff6
-
SHA512
d96094aa3981a7f32559d9a9fd7def8feeaa021ea16b6f02c0d89bc856743a8c83611544ea181d3326f2e656ab59da4e15b09c5a7f195283b16d15794a8efcf5
-
SSDEEP
3072:vDSKiauBZz/DhceNw1OTw+XIU5jwaaHw7Koj4rBnRM:rSKbwhdcqYIhXNAn6
-
Modifies WinLogon for persistence
-
Ramnit family
-
UAC bypass
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Modify Registry
4