General
-
Target
643daec49804b49751bd0a33c6ab4107_JaffaCakes118
-
Size
646KB
-
Sample
240722-wr98wszene
-
MD5
643daec49804b49751bd0a33c6ab4107
-
SHA1
7a0df7d13959291039a5c355aaf346b801822bbc
-
SHA256
3be96fae73eee287dee7a806e61278695afdb340b3d1efea2f68df960e71d5a5
-
SHA512
421857dc6ff4e0ea18a6499c0895e7b8ea299e85d0f1ddaa816e1a48381aa2924e259171e8397d0f62e5b27c7b184cde4746a13f2171f682c6c7994b385c6b64
-
SSDEEP
12288:W9hD4I9UbehTB0m2b+4bofIP0I07zcAQ4/ejsYmBN66tfPQG5iKICqmFXgiFYBTJ:tIybe9B0m2RbofIP0I07zcAQ4/ejsYmV
Static task
static1
Behavioral task
behavioral1
Sample
643daec49804b49751bd0a33c6ab4107_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
643daec49804b49751bd0a33c6ab4107_JaffaCakes118
-
Size
646KB
-
MD5
643daec49804b49751bd0a33c6ab4107
-
SHA1
7a0df7d13959291039a5c355aaf346b801822bbc
-
SHA256
3be96fae73eee287dee7a806e61278695afdb340b3d1efea2f68df960e71d5a5
-
SHA512
421857dc6ff4e0ea18a6499c0895e7b8ea299e85d0f1ddaa816e1a48381aa2924e259171e8397d0f62e5b27c7b184cde4746a13f2171f682c6c7994b385c6b64
-
SSDEEP
12288:W9hD4I9UbehTB0m2b+4bofIP0I07zcAQ4/ejsYmBN66tfPQG5iKICqmFXgiFYBTJ:tIybe9B0m2RbofIP0I07zcAQ4/ejsYmV
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1