General
-
Target
0652a96b3cb334aad7d4849ab18fbabf_JaffaCakes118
-
Size
6.7MB
-
Sample
240428-3lh1saca56
-
MD5
0652a96b3cb334aad7d4849ab18fbabf
-
SHA1
df6f791fa391bed26583efcddf37c6dd4a266bb9
-
SHA256
6a0f72eca9db0505db6a92137cfcacbeb01541a628c643cef2554c46253040b8
-
SHA512
a7e01f999294fef1869506dbb622c2a7a49a3f0987d31eb4424c0682c6faea5f6bbdb3ae705e6dbe7333bb450ff2883415603d4307f3a6c3591704f62a445401
-
SSDEEP
196608:Ta9+6Y7SOEibgRBGBfW8ZPzmGP8bGBfW81a:TFgRGWLGZW81a
Behavioral task
behavioral1
Sample
0652a96b3cb334aad7d4849ab18fbabf_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
0652a96b3cb334aad7d4849ab18fbabf_JaffaCakes118
-
Size
6.7MB
-
MD5
0652a96b3cb334aad7d4849ab18fbabf
-
SHA1
df6f791fa391bed26583efcddf37c6dd4a266bb9
-
SHA256
6a0f72eca9db0505db6a92137cfcacbeb01541a628c643cef2554c46253040b8
-
SHA512
a7e01f999294fef1869506dbb622c2a7a49a3f0987d31eb4424c0682c6faea5f6bbdb3ae705e6dbe7333bb450ff2883415603d4307f3a6c3591704f62a445401
-
SSDEEP
196608:Ta9+6Y7SOEibgRBGBfW8ZPzmGP8bGBfW81a:TFgRGWLGZW81a
-
Detect Blackmoon payload
-
XMRig Miner payload
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2