General
-
Target
382af56f07093801a0ebdc5dd3591c14_JaffaCakes118
-
Size
16.6MB
-
Sample
240711-h1mbjaxeqa
-
MD5
382af56f07093801a0ebdc5dd3591c14
-
SHA1
2463e605cf9a141097dd55757a0924a7991d6cb2
-
SHA256
da7753e918cd9724db7460f148f52c1ed9d82a26f0d52996db07e4a0265f6d95
-
SHA512
d454863bb9ab6e568d0cea00c1c96756dc35d98a20bd6499f38572cb465d4cd1e29d9d24ce6d37f1cdd873e47b876985d4790e4a9628db961b056227ad064158
-
SSDEEP
393216:uJjS/1DWcbM4UUx/ldheoiv8S13gFtyLLsJ2rKXs49Lun:MjSNWcQ4zzzivj13gFwDKc49Lun
Static task
static1
Behavioral task
behavioral1
Sample
382af56f07093801a0ebdc5dd3591c14_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
382af56f07093801a0ebdc5dd3591c14_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
382af56f07093801a0ebdc5dd3591c14_JaffaCakes118
-
Size
16.6MB
-
MD5
382af56f07093801a0ebdc5dd3591c14
-
SHA1
2463e605cf9a141097dd55757a0924a7991d6cb2
-
SHA256
da7753e918cd9724db7460f148f52c1ed9d82a26f0d52996db07e4a0265f6d95
-
SHA512
d454863bb9ab6e568d0cea00c1c96756dc35d98a20bd6499f38572cb465d4cd1e29d9d24ce6d37f1cdd873e47b876985d4790e4a9628db961b056227ad064158
-
SSDEEP
393216:uJjS/1DWcbM4UUx/ldheoiv8S13gFtyLLsJ2rKXs49Lun:MjSNWcQ4zzzivj13gFwDKc49Lun
-
Event Triggered Execution: Image File Execution Options Injection
-
Server Software Component: Terminal Services DLL
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1