General
-
Target
5a7a2143b1af1c765c4771c8eb218d7a_JaffaCakes118
-
Size
568KB
-
Sample
240719-e59e3swdld
-
MD5
5a7a2143b1af1c765c4771c8eb218d7a
-
SHA1
44bff0051333b9f0b11e92334c52139e848a64cd
-
SHA256
e712e370e41df79390877580930f72642efe97a874730e3eb87184356faa3b15
-
SHA512
0e0ba548d938f38ba6059df0a007edb074a32639e6d1ccdd93fdea544975892febfeb9aceae0a436fa02b4ef09649b61a0163c282106dcfebcf833f7c038349a
-
SSDEEP
12288:o3nZMhJ+ubNWSPcxMSaMlZFm88t52CDR0d8sOLKDSOby7:o3nZqfbNPcW22Jt5BDRXsOLYSObU
Static task
static1
Behavioral task
behavioral1
Sample
5a7a2143b1af1c765c4771c8eb218d7a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a7a2143b1af1c765c4771c8eb218d7a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
latentbot
1microsoftx.zapto.org
2microsoftx.zapto.org
3microsoftx.zapto.org
4microsoftx.zapto.org
5microsoftx.zapto.org
6microsoftx.zapto.org
7microsoftx.zapto.org
8microsoftx.zapto.org
Targets
-
-
Target
5a7a2143b1af1c765c4771c8eb218d7a_JaffaCakes118
-
Size
568KB
-
MD5
5a7a2143b1af1c765c4771c8eb218d7a
-
SHA1
44bff0051333b9f0b11e92334c52139e848a64cd
-
SHA256
e712e370e41df79390877580930f72642efe97a874730e3eb87184356faa3b15
-
SHA512
0e0ba548d938f38ba6059df0a007edb074a32639e6d1ccdd93fdea544975892febfeb9aceae0a436fa02b4ef09649b61a0163c282106dcfebcf833f7c038349a
-
SSDEEP
12288:o3nZMhJ+ubNWSPcxMSaMlZFm88t52CDR0d8sOLKDSOby7:o3nZqfbNPcW22Jt5BDRXsOLYSObU
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1