General
-
Target
688dee4f2057a90ce1b5879be7cb0b47_JaffaCakes118
-
Size
239KB
-
Sample
240723-v6b4za1enr
-
MD5
688dee4f2057a90ce1b5879be7cb0b47
-
SHA1
4ab5e9522dacfb3755b615778fd5a9d4ce730773
-
SHA256
2953c6b61d62a95d904baa4a33731128940db283ddea5cebf9ac2b308fdfb703
-
SHA512
acb9cbd5e59ae6aee4ca6cf779607b24f30e1dd93594ffa115462f4d9d4335d76b72060ba6e3dc03194b4f1c10e3ef942bd0571a8256bed7f302a31526686bbb
-
SSDEEP
6144:Box5TDrw7XlguLM2z0Rjha0fVBzhFTKASWHQayoMmzL:WM7XljLM2UtvdZhFTKPA3DMmzL
Behavioral task
behavioral1
Sample
688dee4f2057a90ce1b5879be7cb0b47_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
688dee4f2057a90ce1b5879be7cb0b47_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
688dee4f2057a90ce1b5879be7cb0b47_JaffaCakes118
-
Size
239KB
-
MD5
688dee4f2057a90ce1b5879be7cb0b47
-
SHA1
4ab5e9522dacfb3755b615778fd5a9d4ce730773
-
SHA256
2953c6b61d62a95d904baa4a33731128940db283ddea5cebf9ac2b308fdfb703
-
SHA512
acb9cbd5e59ae6aee4ca6cf779607b24f30e1dd93594ffa115462f4d9d4335d76b72060ba6e3dc03194b4f1c10e3ef942bd0571a8256bed7f302a31526686bbb
-
SSDEEP
6144:Box5TDrw7XlguLM2z0Rjha0fVBzhFTKASWHQayoMmzL:WM7XljLM2UtvdZhFTKPA3DMmzL
Score10/10-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1