General
-
Target
043c4cc3ebcad38f434c30767a712308_JaffaCakes118
-
Size
10.2MB
-
Sample
240428-dj6lmaef83
-
MD5
043c4cc3ebcad38f434c30767a712308
-
SHA1
67064be082e8d10cb7076b67034445ca3a5a54e7
-
SHA256
1df47d538393ff56f502c5a252979187a19ecd39c0199324c345ca73b51aea52
-
SHA512
a932cc7ac55a9b11af52c3afc3ef08714ce5db2f6d3754f57b85cdf8f338896f4165f5e8514cca48053e496700df9a239226271982153f5286cee0219af9e494
-
SSDEEP
196608:Ta9+6Y7SOEibgRyGBfWXa9+6Y7SOEibgRyGBfWgJZPzmGP8d:TFgRTWXFgRTWgWGS
Behavioral task
behavioral1
Sample
043c4cc3ebcad38f434c30767a712308_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
043c4cc3ebcad38f434c30767a712308_JaffaCakes118
-
Size
10.2MB
-
MD5
043c4cc3ebcad38f434c30767a712308
-
SHA1
67064be082e8d10cb7076b67034445ca3a5a54e7
-
SHA256
1df47d538393ff56f502c5a252979187a19ecd39c0199324c345ca73b51aea52
-
SHA512
a932cc7ac55a9b11af52c3afc3ef08714ce5db2f6d3754f57b85cdf8f338896f4165f5e8514cca48053e496700df9a239226271982153f5286cee0219af9e494
-
SSDEEP
196608:Ta9+6Y7SOEibgRyGBfWXa9+6Y7SOEibgRyGBfWgJZPzmGP8d:TFgRTWXFgRTWgWGS
-
Detect Blackmoon payload
-
XMRig Miner payload
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2