General
-
Target
fef1dddddde5a01cd2ed74e6c031bd23_JaffaCakes118
-
Size
332KB
-
Sample
240421-k52ywsgb4x
-
MD5
fef1dddddde5a01cd2ed74e6c031bd23
-
SHA1
38a3ed6a45566821ffdb0e13558d0869f4fec077
-
SHA256
a6bffcb4a9a7eb5cab0789e497350262ba9ced233acb1ca2d598f756e7e47289
-
SHA512
0711a792ff2824e0e244d7dcf16dc92cf97d34d0c9a56f62f00fbe9e670a11923f7e7c822bdb5a6e73159bd8459a2a115d84140c606acd1e706bd931621db905
-
SSDEEP
6144:qutIFH/0RO0uydH3+BmV4gOj/Tz707JLEB8yA1muSE9jl+:qutIFfqVdH3+BmOBj/n70Fm8HmPi+
Static task
static1
Behavioral task
behavioral1
Sample
fef1dddddde5a01cd2ed74e6c031bd23_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fef1dddddde5a01cd2ed74e6c031bd23_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
tofsee
quadoil.ru
lakeflex.ru
Targets
-
-
Target
fef1dddddde5a01cd2ed74e6c031bd23_JaffaCakes118
-
Size
332KB
-
MD5
fef1dddddde5a01cd2ed74e6c031bd23
-
SHA1
38a3ed6a45566821ffdb0e13558d0869f4fec077
-
SHA256
a6bffcb4a9a7eb5cab0789e497350262ba9ced233acb1ca2d598f756e7e47289
-
SHA512
0711a792ff2824e0e244d7dcf16dc92cf97d34d0c9a56f62f00fbe9e670a11923f7e7c822bdb5a6e73159bd8459a2a115d84140c606acd1e706bd931621db905
-
SSDEEP
6144:qutIFH/0RO0uydH3+BmV4gOj/Tz707JLEB8yA1muSE9jl+:qutIFfqVdH3+BmOBj/n70Fm8HmPi+
Score10/10-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2