General
-
Target
29b2d42732f059e2462348387cf992ef_JaffaCakes118
-
Size
2.1MB
-
Sample
240707-dx5aqavdlg
-
MD5
29b2d42732f059e2462348387cf992ef
-
SHA1
b82ee7f6e44facb0640b0732a5857cf6bc3278a1
-
SHA256
16f0a2cfcb031796e99cd46bdbe28a4a621586c843bd1e3106d543ce1afb8fc3
-
SHA512
bf0e09f8226c5366545eb71bd98eead2f6be659a15f3ac41d310e6e351f40eee8ba1295baa9ce038c1a5ed576b2515b13d74165523e4678f074fd6728bf7db35
-
SSDEEP
49152:AtKOxwdTJxPJV6yFXSbhowRsDqUPN6r/1gQo1LnvS7:AFwlJx6MXSbhpOLPO1gHJS7
Static task
static1
Behavioral task
behavioral1
Sample
29b2d42732f059e2462348387cf992ef_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
29b2d42732f059e2462348387cf992ef_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
http://galaint.coolsecupdate.info/?0=115&1=1&2=1&3=34&4=i&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000&12=aftxcjvbni&14=1
Extracted
http://galaint.coolsecupdate.info/?0=115&1=1&2=1&3=34&4=i&5=9200&6=6&7=2&8=919041&9=1033&10=0&11=0000&12=xiilipdbgh&14=1
Targets
-
-
Target
29b2d42732f059e2462348387cf992ef_JaffaCakes118
-
Size
2.1MB
-
MD5
29b2d42732f059e2462348387cf992ef
-
SHA1
b82ee7f6e44facb0640b0732a5857cf6bc3278a1
-
SHA256
16f0a2cfcb031796e99cd46bdbe28a4a621586c843bd1e3106d543ce1afb8fc3
-
SHA512
bf0e09f8226c5366545eb71bd98eead2f6be659a15f3ac41d310e6e351f40eee8ba1295baa9ce038c1a5ed576b2515b13d74165523e4678f074fd6728bf7db35
-
SSDEEP
49152:AtKOxwdTJxPJV6yFXSbhowRsDqUPN6r/1gQo1LnvS7:AFwlJx6MXSbhpOLPO1gHJS7
Score10/10-
Disables taskbar notifications via registry modification
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1