General
-
Target
11cb4eb10453d144006a6f84d2a3048b_JaffaCakes118
-
Size
1.3MB
-
Sample
240626-m88a7asala
-
MD5
11cb4eb10453d144006a6f84d2a3048b
-
SHA1
7967a0d2b34c4b86be783b8ce3b4c51691fafba3
-
SHA256
d901e7642ce6df81c42f02571068de58a2955e5c299be950c0746f868a9399ec
-
SHA512
03c33268b60eb9bf6b96acfafd64ef5ef5cca2e99ab05c31d93779afcb5ba9c88ce7b952f6a06f8127216b29ba275ec954fb126087ca63723a93f0abd0dc1572
-
SSDEEP
24576:BbCrhfsSO6omIC13GWK5m0c4RWj0KmSFe6In4uBCqGCLSrWbk:Bb0hkS2bCFSwgRWj0s2oqpZk
Static task
static1
Behavioral task
behavioral1
Sample
11cb4eb10453d144006a6f84d2a3048b_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
11cb4eb10453d144006a6f84d2a3048b_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
11cb4eb10453d144006a6f84d2a3048b_JaffaCakes118
-
Size
1.3MB
-
MD5
11cb4eb10453d144006a6f84d2a3048b
-
SHA1
7967a0d2b34c4b86be783b8ce3b4c51691fafba3
-
SHA256
d901e7642ce6df81c42f02571068de58a2955e5c299be950c0746f868a9399ec
-
SHA512
03c33268b60eb9bf6b96acfafd64ef5ef5cca2e99ab05c31d93779afcb5ba9c88ce7b952f6a06f8127216b29ba275ec954fb126087ca63723a93f0abd0dc1572
-
SSDEEP
24576:BbCrhfsSO6omIC13GWK5m0c4RWj0KmSFe6In4uBCqGCLSrWbk:Bb0hkS2bCFSwgRWj0s2oqpZk
Score10/10-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1