General
-
Target
3fc92e5d34ae656ad8ef85e0ee1e4f12_JaffaCakes118
-
Size
515KB
-
Sample
240713-clpkfs1drj
-
MD5
3fc92e5d34ae656ad8ef85e0ee1e4f12
-
SHA1
ed670181751fcc091b3419cb6b7081adbd5ac722
-
SHA256
8b3b8df6a16eed6edc74e0b57adf7e057e643d572ae1fcd6d806e9c78141e145
-
SHA512
752e26940de0a40a1e6937007f927695d49329468eed0936dc7e264252bd75f9ae206cfe8ccc6fe0b14d1a14ce161e87985623a671fdf603ef17ff5b44265431
-
SSDEEP
12288:uyDqtM3bdDzjp6rG6srN4LOU0Rm0dj6EUMJ:zDqiVp6r9IN60RHd5J
Static task
static1
Behavioral task
behavioral1
Sample
3fc92e5d34ae656ad8ef85e0ee1e4f12_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
latentbot
dcomete70353.zapto.org
1dcomete70353.zapto.org
2dcomete70353.zapto.org
3dcomete70353.zapto.org
4dcomete70353.zapto.org
5dcomete70353.zapto.org
6dcomete70353.zapto.org
7dcomete70353.zapto.org
8dcomete70353.zapto.org
Targets
-
-
Target
3fc92e5d34ae656ad8ef85e0ee1e4f12_JaffaCakes118
-
Size
515KB
-
MD5
3fc92e5d34ae656ad8ef85e0ee1e4f12
-
SHA1
ed670181751fcc091b3419cb6b7081adbd5ac722
-
SHA256
8b3b8df6a16eed6edc74e0b57adf7e057e643d572ae1fcd6d806e9c78141e145
-
SHA512
752e26940de0a40a1e6937007f927695d49329468eed0936dc7e264252bd75f9ae206cfe8ccc6fe0b14d1a14ce161e87985623a671fdf603ef17ff5b44265431
-
SSDEEP
12288:uyDqtM3bdDzjp6rG6srN4LOU0Rm0dj6EUMJ:zDqiVp6r9IN60RHd5J
-
Modifies firewall policy service
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1