General
-
Target
4f84afc78b877412709a522bc52aefbf_JaffaCakes118
-
Size
389KB
-
Sample
240716-wy5xravbjq
-
MD5
4f84afc78b877412709a522bc52aefbf
-
SHA1
6518b24623cea124f9e954df4af260070b5ef4e2
-
SHA256
87c17d033b53cca26f96f6058b1629037c632fd036f2ec1c988846b0c08ceef8
-
SHA512
e36d2b7788d3cccf6f256a5e5bc0545b8dceb69f9197e76ea2b5008d24dc7b6437a05d82c735c50dcdf3f5f6d8fa1ac67f9edc10b8f8089c6d58935e11336423
-
SSDEEP
12288:AR72EqluswR45JTnaEY2Pupd8a2aRTiua:AR7uE4BaEY2Pt
Behavioral task
behavioral1
Sample
4f84afc78b877412709a522bc52aefbf_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
latentbot
backdoor2012.zapto.org
Targets
-
-
Target
4f84afc78b877412709a522bc52aefbf_JaffaCakes118
-
Size
389KB
-
MD5
4f84afc78b877412709a522bc52aefbf
-
SHA1
6518b24623cea124f9e954df4af260070b5ef4e2
-
SHA256
87c17d033b53cca26f96f6058b1629037c632fd036f2ec1c988846b0c08ceef8
-
SHA512
e36d2b7788d3cccf6f256a5e5bc0545b8dceb69f9197e76ea2b5008d24dc7b6437a05d82c735c50dcdf3f5f6d8fa1ac67f9edc10b8f8089c6d58935e11336423
-
SSDEEP
12288:AR72EqluswR45JTnaEY2Pupd8a2aRTiua:AR7uE4BaEY2Pt
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1