General
-
Target
f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118
-
Size
333KB
-
Sample
240417-hq2y8sgc99
-
MD5
f53aeee66a0b0dc9cdf6dd537f48287c
-
SHA1
e7e29654829306c7c1633190833d1fe8fc0c44b5
-
SHA256
a3eb89c5fe1e820b0ba694c4aeab1351999630b490d988b4dd698753ab8eb7dc
-
SHA512
6d7a5f77650886803623ae6c3f7aae73a6a4d641b47cbe4707df91d5ed150b55da4a79be0abcdaa4ad2418037579abf966baf451c56eeb41c1a1183916eba04a
-
SSDEEP
6144:/Q41aFOBM9gLaaxfOcWB4KsjKTzcbbyXoAsy6mOnbe3q:o44FuX+axfOcWKhjKncb+vsTmql
Static task
static1
Behavioral task
behavioral1
Sample
f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
tofsee
quadoil.ru
lakeflex.ru
Targets
-
-
Target
f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118
-
Size
333KB
-
MD5
f53aeee66a0b0dc9cdf6dd537f48287c
-
SHA1
e7e29654829306c7c1633190833d1fe8fc0c44b5
-
SHA256
a3eb89c5fe1e820b0ba694c4aeab1351999630b490d988b4dd698753ab8eb7dc
-
SHA512
6d7a5f77650886803623ae6c3f7aae73a6a4d641b47cbe4707df91d5ed150b55da4a79be0abcdaa4ad2418037579abf966baf451c56eeb41c1a1183916eba04a
-
SSDEEP
6144:/Q41aFOBM9gLaaxfOcWB4KsjKTzcbbyXoAsy6mOnbe3q:o44FuX+axfOcWKhjKncb+vsTmql
Score10/10-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2