General
-
Target
4c17d60ff66bcf8649f95c1051cdb6ba_JaffaCakes118
-
Size
258KB
-
Sample
240716-ayy9baxarr
-
MD5
4c17d60ff66bcf8649f95c1051cdb6ba
-
SHA1
dec6bdb527d90ce6cd16b394d8329a5323d74d52
-
SHA256
93c5a1d15b9e56491cac278b138a68a8a71fe0274e1e1619f226a829a492d9f0
-
SHA512
ae881178b513fc56b7a162811d9917c32d60f74694f06ceefb20c0030ba267227e5b746db382b39870848558349e869bf2671dfd5a5b6868467511b1c67bd63f
-
SSDEEP
6144:HhqvucbF9AwphUegCEe9dbAOSFGQQytBWoL:Hhql9AuhrwGAOSFUYL
Static task
static1
Behavioral task
behavioral1
Sample
4c17d60ff66bcf8649f95c1051cdb6ba_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c17d60ff66bcf8649f95c1051cdb6ba_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
latentbot
propagandagreifing.zapto.org
Targets
-
-
Target
4c17d60ff66bcf8649f95c1051cdb6ba_JaffaCakes118
-
Size
258KB
-
MD5
4c17d60ff66bcf8649f95c1051cdb6ba
-
SHA1
dec6bdb527d90ce6cd16b394d8329a5323d74d52
-
SHA256
93c5a1d15b9e56491cac278b138a68a8a71fe0274e1e1619f226a829a492d9f0
-
SHA512
ae881178b513fc56b7a162811d9917c32d60f74694f06ceefb20c0030ba267227e5b746db382b39870848558349e869bf2671dfd5a5b6868467511b1c67bd63f
-
SSDEEP
6144:HhqvucbF9AwphUegCEe9dbAOSFGQQytBWoL:Hhql9AuhrwGAOSFUYL
Score10/10-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1