General
-
Target
6ab3057eb883ca57b27c074362b6c35b_JaffaCakes118
-
Size
532KB
-
Sample
240724-h13cratfrl
-
MD5
6ab3057eb883ca57b27c074362b6c35b
-
SHA1
75122422f557a20171b8955d1b118149a5b04b95
-
SHA256
a69ed914e22d0c456dc682c5ac6c0ab1efc8f32cec03789af56d406f2ee8d02a
-
SHA512
98be79d1756696c29b4f3651ef8f1a95ae0edc0767881074ec2ecd1df3dd14d80c001115f9bf700edea8dc52a893a59495ab11e86b306bde22aabc749aee12e5
-
SSDEEP
12288:X++cdJTEkUKe2qB1RF1qiOmD80t6IIDmWJxwucXGFTd:XMNEChcx1qi9D80tXICrucSTd
Static task
static1
Behavioral task
behavioral1
Sample
6ab3057eb883ca57b27c074362b6c35b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6ab3057eb883ca57b27c074362b6c35b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
6ab3057eb883ca57b27c074362b6c35b_JaffaCakes118
-
Size
532KB
-
MD5
6ab3057eb883ca57b27c074362b6c35b
-
SHA1
75122422f557a20171b8955d1b118149a5b04b95
-
SHA256
a69ed914e22d0c456dc682c5ac6c0ab1efc8f32cec03789af56d406f2ee8d02a
-
SHA512
98be79d1756696c29b4f3651ef8f1a95ae0edc0767881074ec2ecd1df3dd14d80c001115f9bf700edea8dc52a893a59495ab11e86b306bde22aabc749aee12e5
-
SSDEEP
12288:X++cdJTEkUKe2qB1RF1qiOmD80t6IIDmWJxwucXGFTd:XMNEChcx1qi9D80tXICrucSTd
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables taskbar notifications via registry modification
-
Deletes itself
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1