General
-
Target
0017c17069fcd00a8c13e2e1bb955494_JaffaCakes118
-
Size
269KB
-
Sample
240621-2y9tlathjf
-
MD5
0017c17069fcd00a8c13e2e1bb955494
-
SHA1
e12d88f2d4493b8bd9a032b592802f7d72af3ffc
-
SHA256
6cc4a73d5534504263a2fe5e7b2cc95269f151bb032ea22fb8ad55fbc8f4a94f
-
SHA512
b29db9dfe9bd70c8b16584555e7ee32487b92996ee251a9f6c5ef2f266ab01ba1a77ec36954fd6a767a1d0e8ed48afe2314a11902eb104dd92f4080eccc21759
-
SSDEEP
6144:+dVLk+QT3LPhQurUJKD/W9DvLUq8WmHKpv9RALcbM0540/Ix0BY71OT:pZJ4Dvg8mab62q0/I2aB2
Static task
static1
Behavioral task
behavioral1
Sample
0017c17069fcd00a8c13e2e1bb955494_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
0017c17069fcd00a8c13e2e1bb955494_JaffaCakes118
-
Size
269KB
-
MD5
0017c17069fcd00a8c13e2e1bb955494
-
SHA1
e12d88f2d4493b8bd9a032b592802f7d72af3ffc
-
SHA256
6cc4a73d5534504263a2fe5e7b2cc95269f151bb032ea22fb8ad55fbc8f4a94f
-
SHA512
b29db9dfe9bd70c8b16584555e7ee32487b92996ee251a9f6c5ef2f266ab01ba1a77ec36954fd6a767a1d0e8ed48afe2314a11902eb104dd92f4080eccc21759
-
SSDEEP
6144:+dVLk+QT3LPhQurUJKD/W9DvLUq8WmHKpv9RALcbM0540/Ix0BY71OT:pZJ4Dvg8mab62q0/I2aB2
-
Modifies security service
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1