General
-
Target
5300e40f5682656bfdfd156060de19f3_JaffaCakes118
-
Size
192KB
-
Sample
240717-psttza1cmp
-
MD5
5300e40f5682656bfdfd156060de19f3
-
SHA1
ea1a973c318e451b4ec458af5d6946da37274624
-
SHA256
c488258e43c071736fc9ee54e8d2a5847ae8b0d98f8b44be0a65478cd057e1bc
-
SHA512
38f699bf5976a3b92d457485c88782e58a94f3691d3ddf89eb46365a2d2dd68719b9d17f77a971b3976e249a068432ef9bfcdd570fa4ffcd91fdb622ce42c1a3
-
SSDEEP
3072:9956gt/E/Nml9R2wvunEQfHy9YEbaUk0QvuNlRTHvMfHxgZlBlEUsqRCmRO0:X5rt0twvgD/y9fbrk0WuNlRHkvIBaqIy
Static task
static1
Behavioral task
behavioral1
Sample
5300e40f5682656bfdfd156060de19f3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5300e40f5682656bfdfd156060de19f3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
latentbot
joshdarkcomet.zapto.org
1joshdarkcomet.zapto.org
2joshdarkcomet.zapto.org
3joshdarkcomet.zapto.org
4joshdarkcomet.zapto.org
5joshdarkcomet.zapto.org
6joshdarkcomet.zapto.org
7joshdarkcomet.zapto.org
8joshdarkcomet.zapto.org
Targets
-
-
Target
5300e40f5682656bfdfd156060de19f3_JaffaCakes118
-
Size
192KB
-
MD5
5300e40f5682656bfdfd156060de19f3
-
SHA1
ea1a973c318e451b4ec458af5d6946da37274624
-
SHA256
c488258e43c071736fc9ee54e8d2a5847ae8b0d98f8b44be0a65478cd057e1bc
-
SHA512
38f699bf5976a3b92d457485c88782e58a94f3691d3ddf89eb46365a2d2dd68719b9d17f77a971b3976e249a068432ef9bfcdd570fa4ffcd91fdb622ce42c1a3
-
SSDEEP
3072:9956gt/E/Nml9R2wvunEQfHy9YEbaUk0QvuNlRTHvMfHxgZlBlEUsqRCmRO0:X5rt0twvgD/y9fbrk0WuNlRHkvIBaqIy
Score10/10-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1