General
-
Target
67585188a0471eca7f60e3ae3fb4ea38_JaffaCakes118
-
Size
44KB
-
Sample
240723-m9xk3ssfkg
-
MD5
67585188a0471eca7f60e3ae3fb4ea38
-
SHA1
c2d8adee50d4c29c8947f93a492a81ed2ddff4a5
-
SHA256
6a3ba520ce946c2bae1d70a6af427ac2b9e6b2c8d9ea0cbfaa50ed739ef718ba
-
SHA512
80778ada72ef07df64ca6cc5bb57602a2b9819822c298a95844b9a6e689f86089a46e80e9754cce2fa8c75b778134dcff681f6c64edcdfc5e95a797b48427aeb
-
SSDEEP
384:vzxRfNhp3ccqu+c6H28888888888888888888888888888888888888888888885:bT6cqu/6HCncG1etoQ7pN90S31yViHa
Static task
static1
Behavioral task
behavioral1
Sample
67585188a0471eca7f60e3ae3fb4ea38_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
67585188a0471eca7f60e3ae3fb4ea38_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
67585188a0471eca7f60e3ae3fb4ea38_JaffaCakes118
-
Size
44KB
-
MD5
67585188a0471eca7f60e3ae3fb4ea38
-
SHA1
c2d8adee50d4c29c8947f93a492a81ed2ddff4a5
-
SHA256
6a3ba520ce946c2bae1d70a6af427ac2b9e6b2c8d9ea0cbfaa50ed739ef718ba
-
SHA512
80778ada72ef07df64ca6cc5bb57602a2b9819822c298a95844b9a6e689f86089a46e80e9754cce2fa8c75b778134dcff681f6c64edcdfc5e95a797b48427aeb
-
SSDEEP
384:vzxRfNhp3ccqu+c6H28888888888888888888888888888888888888888888885:bT6cqu/6HCncG1etoQ7pN90S31yViHa
Score10/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Active Setup
1