General
-
Target
5645db002cf50e8ccf0adec15af36ded_JaffaCakes118
-
Size
408KB
-
Sample
240718-fzaj8szdpd
-
MD5
5645db002cf50e8ccf0adec15af36ded
-
SHA1
e08fa168b5e60f1656545d21abf7266dccf8f5ca
-
SHA256
ce14f8e6fea63126717ed66a2d70f7a02ec102f2817ab7321c6ac334433c94bb
-
SHA512
7f2954cd149141c6dd8e2617f7f52451303dcc6c9516b0bad7a6bb97b3b17e001e88093af8e4ad2073c0ccfab9af3ea52adb18ba5aa625638bc5ffd771cd4b0d
-
SSDEEP
6144:ECpofVdEFKm5tCk3F9LK9LF/k8Yg9nykF9EyX27mguOsaXwom3V4y:ECutdwKmfCkLKJF/3FEskmguOsxoG
Static task
static1
Behavioral task
behavioral1
Sample
5645db002cf50e8ccf0adec15af36ded_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5645db002cf50e8ccf0adec15af36ded_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
latentbot
1haverstock.zapto.org
2haverstock.zapto.org
3haverstock.zapto.org
4haverstock.zapto.org
5haverstock.zapto.org
6haverstock.zapto.org
7haverstock.zapto.org
8haverstock.zapto.org
Targets
-
-
Target
5645db002cf50e8ccf0adec15af36ded_JaffaCakes118
-
Size
408KB
-
MD5
5645db002cf50e8ccf0adec15af36ded
-
SHA1
e08fa168b5e60f1656545d21abf7266dccf8f5ca
-
SHA256
ce14f8e6fea63126717ed66a2d70f7a02ec102f2817ab7321c6ac334433c94bb
-
SHA512
7f2954cd149141c6dd8e2617f7f52451303dcc6c9516b0bad7a6bb97b3b17e001e88093af8e4ad2073c0ccfab9af3ea52adb18ba5aa625638bc5ffd771cd4b0d
-
SSDEEP
6144:ECpofVdEFKm5tCk3F9LK9LF/k8Yg9nykF9EyX27mguOsaXwom3V4y:ECutdwKmfCkLKJF/3FEskmguOsxoG
Score10/10-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1