General
-
Target
5f42b865b5dc3a1e092db625efff4447_JaffaCakes118
-
Size
489KB
-
Sample
240720-gh17asseng
-
MD5
5f42b865b5dc3a1e092db625efff4447
-
SHA1
32da1062c067550f431a4580485a60ea7a657121
-
SHA256
2e58c61a2ec3f9cd6a268aeca6826899baf7b50b95e990bec859b7f7c44b452e
-
SHA512
b73239a05f3e292c0ab65e4e06deb01dbaded060471e4d79561cd065c12e2d7e2c1841d2c713330669790bb37d64e3a185ab940ebec995166497e56e32ca24c0
-
SSDEEP
6144:zxhdgS3S2bq4AQKtztEeQRYWbUV3P2atrZ3:zHdgS3S2bPKt7QfbUl2av3
Static task
static1
Behavioral task
behavioral1
Sample
5f42b865b5dc3a1e092db625efff4447_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5f42b865b5dc3a1e092db625efff4447_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
latentbot
georgedavid.zapto.org
Targets
-
-
Target
5f42b865b5dc3a1e092db625efff4447_JaffaCakes118
-
Size
489KB
-
MD5
5f42b865b5dc3a1e092db625efff4447
-
SHA1
32da1062c067550f431a4580485a60ea7a657121
-
SHA256
2e58c61a2ec3f9cd6a268aeca6826899baf7b50b95e990bec859b7f7c44b452e
-
SHA512
b73239a05f3e292c0ab65e4e06deb01dbaded060471e4d79561cd065c12e2d7e2c1841d2c713330669790bb37d64e3a185ab940ebec995166497e56e32ca24c0
-
SSDEEP
6144:zxhdgS3S2bq4AQKtztEeQRYWbUV3P2atrZ3:zHdgS3S2bPKt7QfbUl2av3
Score10/10-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1