General
-
Target
643ae41b773497893d981126bad39c7c_JaffaCakes118
-
Size
524KB
-
Sample
240722-wqltxa1alk
-
MD5
643ae41b773497893d981126bad39c7c
-
SHA1
367f70419bcaf919c7a186cc62efde9a5cd9b5eb
-
SHA256
c391cb4f68fc65db198cc008cc2c56d26e63c50d7701564ed2aa010c9f55b5e3
-
SHA512
80c82be598987ef7195319d3352c2debe4a1bdb8e5a79f38f313421bb6a5579ddde2c2949d4e8782a067344ef5e51b06d9ebb0a36c7220f37acaa44ded0bc55a
-
SSDEEP
12288:kSFMFpuhRp8tmnkX4C4IosE/rSkU19Zt/kMM22:rF+u+gkX3o1jSkErM2
Static task
static1
Behavioral task
behavioral1
Sample
643ae41b773497893d981126bad39c7c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
643ae41b773497893d981126bad39c7c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
643ae41b773497893d981126bad39c7c_JaffaCakes118
-
Size
524KB
-
MD5
643ae41b773497893d981126bad39c7c
-
SHA1
367f70419bcaf919c7a186cc62efde9a5cd9b5eb
-
SHA256
c391cb4f68fc65db198cc008cc2c56d26e63c50d7701564ed2aa010c9f55b5e3
-
SHA512
80c82be598987ef7195319d3352c2debe4a1bdb8e5a79f38f313421bb6a5579ddde2c2949d4e8782a067344ef5e51b06d9ebb0a36c7220f37acaa44ded0bc55a
-
SSDEEP
12288:kSFMFpuhRp8tmnkX4C4IosE/rSkU19Zt/kMM22:rF+u+gkX3o1jSkErM2
Score10/10-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3