General
-
Target
3971a17dfe31449440d7f974e353fc55_JaffaCakes118
-
Size
3.5MB
-
Sample
240711-rfb5hazarl
-
MD5
3971a17dfe31449440d7f974e353fc55
-
SHA1
3b471ff12b6bf746624ff47169b2e63481f22be7
-
SHA256
e184ddb99ea689aa34f6374c51b77e5bed16ef0ddf558e5ea0ff46b439fbf6cd
-
SHA512
f0dc3b56346a9608999f7c4daa949861eb7c9a104d4fcf2a33ded5320e239c86679b5d4435f13500bfdbb3de4d06c7ed91d49bd21d966bf88d1fa914107bbe79
-
SSDEEP
98304:BPsll0cd2I2kgozrQG1pGpl6u+dY1hfhRGeJTk:BPsbdCgz5zol63dyhO2Tk
Behavioral task
behavioral1
Sample
3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
3971a17dfe31449440d7f974e353fc55_JaffaCakes118
-
Size
3.5MB
-
MD5
3971a17dfe31449440d7f974e353fc55
-
SHA1
3b471ff12b6bf746624ff47169b2e63481f22be7
-
SHA256
e184ddb99ea689aa34f6374c51b77e5bed16ef0ddf558e5ea0ff46b439fbf6cd
-
SHA512
f0dc3b56346a9608999f7c4daa949861eb7c9a104d4fcf2a33ded5320e239c86679b5d4435f13500bfdbb3de4d06c7ed91d49bd21d966bf88d1fa914107bbe79
-
SSDEEP
98304:BPsll0cd2I2kgozrQG1pGpl6u+dY1hfhRGeJTk:BPsbdCgz5zol63dyhO2Tk
Score9/10-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Disables RegEdit via registry modification
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1