General
-
Target
4e7cf999557893b08c6623c31c45b28d_JaffaCakes118
-
Size
822KB
-
Sample
240517-fg4qcsaa8z
-
MD5
4e7cf999557893b08c6623c31c45b28d
-
SHA1
9f8a085de74277fe2fcd79d77037a0627b79ebc1
-
SHA256
e5184d8982254662e152b0f61fccf90d1230a6f173118a59bc53bc883992de26
-
SHA512
44711a040f3b5329d71b6f0fec1dd21adf16626ffacde92b28603b8358f81f9b8e76f68610629be9a62051273f14396ba7cd24eb87f89a60bca5260f8e337ef8
-
SSDEEP
24576:jYUneM0AEIl09L8fffGkPt0UBEw8qqauuNWKP1UAp9:jYSKAE1ifffJtaw8qBuucKP+A/
Static task
static1
Behavioral task
behavioral1
Sample
4e7cf999557893b08c6623c31c45b28d_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
4e7cf999557893b08c6623c31c45b28d_JaffaCakes118
-
Size
822KB
-
MD5
4e7cf999557893b08c6623c31c45b28d
-
SHA1
9f8a085de74277fe2fcd79d77037a0627b79ebc1
-
SHA256
e5184d8982254662e152b0f61fccf90d1230a6f173118a59bc53bc883992de26
-
SHA512
44711a040f3b5329d71b6f0fec1dd21adf16626ffacde92b28603b8358f81f9b8e76f68610629be9a62051273f14396ba7cd24eb87f89a60bca5260f8e337ef8
-
SSDEEP
24576:jYUneM0AEIl09L8fffGkPt0UBEw8qqauuNWKP1UAp9:jYSKAE1ifffJtaw8qBuucKP+A/
-
DarkTrack payload
-
Modifies WinLogon for persistence
-
Turns off Windows Defender SpyNet reporting
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1