General
-
Target
54e8fbf0609b77a33c5b9d939fc19d15_JaffaCakes118
-
Size
535KB
-
Sample
240518-qk4jwadd63
-
MD5
54e8fbf0609b77a33c5b9d939fc19d15
-
SHA1
60043193630412e9b006e6d4a5334375ffe871ed
-
SHA256
aa95c0aa1fa6efb5123d150ce2cf9eae860cf15391b21560fd79088a84fbcd99
-
SHA512
1e9382482d4adadaa27870095756d348c035c046a6ae8b6a4c59ba037ce2fa4af4493fe150d54f39be5239eee2e4db5a287538faffc864c9b68ff07e0255e5bc
-
SSDEEP
12288:Qru1rDT5oxTPErT8ApZh+cTClRqcLdjKJO9xNiVwPYVYZ6CV9:1axbKDZhzClRXKc/iJs
Static task
static1
Behavioral task
behavioral1
Sample
54e8fbf0609b77a33c5b9d939fc19d15_JaffaCakes118.jar
Resource
win7-20240220-en
Malware Config
Extracted
latentbot
ebukaalilonu.zapto.org
Targets
-
-
Target
54e8fbf0609b77a33c5b9d939fc19d15_JaffaCakes118
-
Size
535KB
-
MD5
54e8fbf0609b77a33c5b9d939fc19d15
-
SHA1
60043193630412e9b006e6d4a5334375ffe871ed
-
SHA256
aa95c0aa1fa6efb5123d150ce2cf9eae860cf15391b21560fd79088a84fbcd99
-
SHA512
1e9382482d4adadaa27870095756d348c035c046a6ae8b6a4c59ba037ce2fa4af4493fe150d54f39be5239eee2e4db5a287538faffc864c9b68ff07e0255e5bc
-
SSDEEP
12288:Qru1rDT5oxTPErT8ApZh+cTClRqcLdjKJO9xNiVwPYVYZ6CV9:1axbKDZhzClRXKc/iJs
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Sets file execution options in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2