General
-
Target
42cf8f73d3118797d370f8a4f0df809b_JaffaCakes118
-
Size
31KB
-
Sample
240713-wyny8ssajm
-
MD5
42cf8f73d3118797d370f8a4f0df809b
-
SHA1
c587620e3c88ed3175d5bfdc64ffaa83c6263c80
-
SHA256
313c38f07a9bf91b834f3c9c060357b6c68f1acfcb168762716066c894e7c4c8
-
SHA512
ec2c68b3a1f1834166668c25aa52eb93b0d197dfe322b6ef6f83c975386acb07082f2f4a9f9e56c892f47a730160947fa6c7e9e54a0f81ac3b0068c91270925d
-
SSDEEP
768:CfmyQpp77WzxROtNKj/qx/vkiQmIDUu0tioDj:qEKGxXQVkLj
Behavioral task
behavioral1
Sample
42cf8f73d3118797d370f8a4f0df809b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
42cf8f73d3118797d370f8a4f0df809b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
njrat
0.7d
SQL Server VSS Wrider
0.tcp.ngrok.io:13436
1f128a35c00c4b30a2683d0434a99bc0
-
reg_key
1f128a35c00c4b30a2683d0434a99bc0
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
42cf8f73d3118797d370f8a4f0df809b_JaffaCakes118
-
Size
31KB
-
MD5
42cf8f73d3118797d370f8a4f0df809b
-
SHA1
c587620e3c88ed3175d5bfdc64ffaa83c6263c80
-
SHA256
313c38f07a9bf91b834f3c9c060357b6c68f1acfcb168762716066c894e7c4c8
-
SHA512
ec2c68b3a1f1834166668c25aa52eb93b0d197dfe322b6ef6f83c975386acb07082f2f4a9f9e56c892f47a730160947fa6c7e9e54a0f81ac3b0068c91270925d
-
SSDEEP
768:CfmyQpp77WzxROtNKj/qx/vkiQmIDUu0tioDj:qEKGxXQVkLj
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1