General
-
Target
04e3a6f8c20c1b2c03b58310882a980f_JaffaCakes118
-
Size
26.9MB
-
Sample
240428-lkczpscg25
-
MD5
04e3a6f8c20c1b2c03b58310882a980f
-
SHA1
e63516275220885e7a1f5ab5477d725484509caf
-
SHA256
20ea7300f88cd1476ee0e65f9133c44f1213ea74ba2824e65a36d69d133df4c7
-
SHA512
c875692ae5831f9e8a2f89360ae8c6f0c3cd079307e1b205569457381d82bf56f866881573bf9ceb1794020e27670ac44c224fd930807773d340c7a614707fe5
-
SSDEEP
786432:zvDllryTZvDllryTCvDllryTZvDllryT:zvDllryTZvDllryTCvDllryTZvDllryT
Behavioral task
behavioral1
Sample
04e3a6f8c20c1b2c03b58310882a980f_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Targets
-
-
Target
04e3a6f8c20c1b2c03b58310882a980f_JaffaCakes118
-
Size
26.9MB
-
MD5
04e3a6f8c20c1b2c03b58310882a980f
-
SHA1
e63516275220885e7a1f5ab5477d725484509caf
-
SHA256
20ea7300f88cd1476ee0e65f9133c44f1213ea74ba2824e65a36d69d133df4c7
-
SHA512
c875692ae5831f9e8a2f89360ae8c6f0c3cd079307e1b205569457381d82bf56f866881573bf9ceb1794020e27670ac44c224fd930807773d340c7a614707fe5
-
SSDEEP
786432:zvDllryTZvDllryTCvDllryTZvDllryT:zvDllryTZvDllryTCvDllryTZvDllryT
-
Detect Blackmoon payload
-
XMRig Miner payload
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2