General
-
Target
04eb4cc714e3c7efc57625896899cacf_JaffaCakes118
-
Size
22.1MB
-
Sample
240428-ltrjfsdb9z
-
MD5
04eb4cc714e3c7efc57625896899cacf
-
SHA1
f9266bc71cdb14d7407006a28c2ec7c2e4f4c13e
-
SHA256
52a20ada632fa6e2a4b9d044a32eba735dc4ae0c31d574d488f1dad393619824
-
SHA512
8e905080d5144dada04e933ca3044b8985c1c5e257bc2274cbf88df238b3733ab63e085750bace5513e3f58bef7fd625354e5162e40728d4bc91afcdf78ced9f
-
SSDEEP
393216:dFgRrgjWT16Irf13GXFgRrgjWT16Irf13GP:Kg32g3h
Behavioral task
behavioral1
Sample
04eb4cc714e3c7efc57625896899cacf_JaffaCakes118.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
04eb4cc714e3c7efc57625896899cacf_JaffaCakes118
-
Size
22.1MB
-
MD5
04eb4cc714e3c7efc57625896899cacf
-
SHA1
f9266bc71cdb14d7407006a28c2ec7c2e4f4c13e
-
SHA256
52a20ada632fa6e2a4b9d044a32eba735dc4ae0c31d574d488f1dad393619824
-
SHA512
8e905080d5144dada04e933ca3044b8985c1c5e257bc2274cbf88df238b3733ab63e085750bace5513e3f58bef7fd625354e5162e40728d4bc91afcdf78ced9f
-
SSDEEP
393216:dFgRrgjWT16Irf13GXFgRrgjWT16Irf13GP:Kg32g3h
-
Detect Blackmoon payload
-
XMRig Miner payload
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2