General
-
Target
3d0f8ee91696b396ff6df25707dd8db3_JaffaCakes118
-
Size
292KB
-
Sample
240712-mvzf5asdmb
-
MD5
3d0f8ee91696b396ff6df25707dd8db3
-
SHA1
124442b4f4e372d9c46c02d51757e4ac16fb4ad4
-
SHA256
7b1789fc6dbf64c86ed5e6c9d3d3aa35a9a75e0461449b6b35899ba19ab7aba9
-
SHA512
3127487e5f73472578570b3e8b0664228af072a76c51b8b8e17d88198daebaef6f5021c13750291645bb63ef5584b0e94850e521c39439b99b6b6da876b9c792
-
SSDEEP
6144:sh3ESgkN7AecZVaYCeKUbbuxb5NZySQAHe8fAIwgw4lAAx9BhmroAiH:A3HQnaYGUmxtlQAHe8fAIwgw4lAAx9BD
Static task
static1
Behavioral task
behavioral1
Sample
3d0f8ee91696b396ff6df25707dd8db3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d0f8ee91696b396ff6df25707dd8db3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
3d0f8ee91696b396ff6df25707dd8db3_JaffaCakes118
-
Size
292KB
-
MD5
3d0f8ee91696b396ff6df25707dd8db3
-
SHA1
124442b4f4e372d9c46c02d51757e4ac16fb4ad4
-
SHA256
7b1789fc6dbf64c86ed5e6c9d3d3aa35a9a75e0461449b6b35899ba19ab7aba9
-
SHA512
3127487e5f73472578570b3e8b0664228af072a76c51b8b8e17d88198daebaef6f5021c13750291645bb63ef5584b0e94850e521c39439b99b6b6da876b9c792
-
SSDEEP
6144:sh3ESgkN7AecZVaYCeKUbbuxb5NZySQAHe8fAIwgw4lAAx9BhmroAiH:A3HQnaYGUmxtlQAHe8fAIwgw4lAAx9BD
Score10/10-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1