General
-
Target
1f9b619074e3ef7c19b296330e290dde_JaffaCakes118
-
Size
2.0MB
-
Sample
240702-rmcdvazgrr
-
MD5
1f9b619074e3ef7c19b296330e290dde
-
SHA1
8342d1aa1cef5d5d10ee68a4dfcca4de12599502
-
SHA256
a6e0ce289db711413ba5395a80e50a0ed95c3927448492d3ecde38506227c571
-
SHA512
3ae7ef2c3181b44816e0cb7186b113c8e99d97e06a56d7b4babf283cdc342f18273e39c66912c41bdbbabc62303bb8bb998cee9db0234847a521df46ae6784c6
-
SSDEEP
49152:DKqoP5uG7LG6sjWmlwsg7IklBKZICcDIGXQvh9zK4tMy+iZKnkJeYuFEb:DQP5uGvC9bg7DlBqICchX8W1iZgkJLuo
Static task
static1
Behavioral task
behavioral1
Sample
1f9b619074e3ef7c19b296330e290dde_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1f9b619074e3ef7c19b296330e290dde_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
http://galaint.coolsecupdate.info/?0=154&1=1&2=1&3=35&4=i&5=9200&6=6&7=2&8=919041&9=1033&10=0&11=0000&12=vijldqbhas&14=1
Targets
-
-
Target
1f9b619074e3ef7c19b296330e290dde_JaffaCakes118
-
Size
2.0MB
-
MD5
1f9b619074e3ef7c19b296330e290dde
-
SHA1
8342d1aa1cef5d5d10ee68a4dfcca4de12599502
-
SHA256
a6e0ce289db711413ba5395a80e50a0ed95c3927448492d3ecde38506227c571
-
SHA512
3ae7ef2c3181b44816e0cb7186b113c8e99d97e06a56d7b4babf283cdc342f18273e39c66912c41bdbbabc62303bb8bb998cee9db0234847a521df46ae6784c6
-
SSDEEP
49152:DKqoP5uG7LG6sjWmlwsg7IklBKZICcDIGXQvh9zK4tMy+iZKnkJeYuFEb:DQP5uGvC9bg7DlBqICchX8W1iZgkJLuo
Score10/10-
Disables taskbar notifications via registry modification
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1