General
-
Target
17f061842ef196c99a83b26e596ba8f9_JaffaCakes118
-
Size
1.1MB
-
Sample
240627-3gqj3a1brn
-
MD5
17f061842ef196c99a83b26e596ba8f9
-
SHA1
26a60203a83cc092f82adf87913faf3a85a41c0e
-
SHA256
759accf1bd2667f280866a701eb77b14425b142554fb1e38886dbad770949996
-
SHA512
1dc5cc588fe529d1af5a89df669df70e05c9dca5318ae289261eb7f5a7841e1278e5b5c516da12ad7d522d5fc5c95057163e9dfb96cf31b8779455d8761c73e9
-
SSDEEP
24576:KGJcEP8yhHvWhGM7gIabihe85rcpLJKnD8/HfKD0gkLIAK69:K6/huUMs7udruNKD6HS4gOl9
Behavioral task
behavioral1
Sample
17f061842ef196c99a83b26e596ba8f9_JaffaCakes118.exe
Resource
win7-20240220-en
Malware Config
Extracted
latentbot
jurizaran0ff.zapto.org
Targets
-
-
Target
17f061842ef196c99a83b26e596ba8f9_JaffaCakes118
-
Size
1.1MB
-
MD5
17f061842ef196c99a83b26e596ba8f9
-
SHA1
26a60203a83cc092f82adf87913faf3a85a41c0e
-
SHA256
759accf1bd2667f280866a701eb77b14425b142554fb1e38886dbad770949996
-
SHA512
1dc5cc588fe529d1af5a89df669df70e05c9dca5318ae289261eb7f5a7841e1278e5b5c516da12ad7d522d5fc5c95057163e9dfb96cf31b8779455d8761c73e9
-
SSDEEP
24576:KGJcEP8yhHvWhGM7gIabihe85rcpLJKnD8/HfKD0gkLIAK69:K6/huUMs7udruNKD6HS4gOl9
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-