General
-
Target
73c9b766597008da6429c6a7d34976ee_JaffaCakes118
-
Size
684KB
-
Sample
240726-m7wk1atgqj
-
MD5
73c9b766597008da6429c6a7d34976ee
-
SHA1
63d90d8d4c536d6f04de29c4fe765fa734d51478
-
SHA256
392de16e2409d8d343945ba2c419006c9eaec76bd54cc6d31ddf68085951c260
-
SHA512
0ea490cab1f887b3fec5d5f7a3f80c4f560128b211920eb9860aa1590a7693ce71a0e23ccafec39e2660b728b00a6e596ea67d96bec0fcc9f30c43d8e46218c5
-
SSDEEP
12288:alfG7uWRq4rk71OVelFSmOk6Eh8PJ2eLBxMY9Z1751qUm2BcvoeS5v5TlMxuKY:alfWuWlrNUlEmn8RH1xMeZ1dgSJ8ul
Static task
static1
Behavioral task
behavioral1
Sample
73c9b766597008da6429c6a7d34976ee_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73c9b766597008da6429c6a7d34976ee_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
73c9b766597008da6429c6a7d34976ee_JaffaCakes118
-
Size
684KB
-
MD5
73c9b766597008da6429c6a7d34976ee
-
SHA1
63d90d8d4c536d6f04de29c4fe765fa734d51478
-
SHA256
392de16e2409d8d343945ba2c419006c9eaec76bd54cc6d31ddf68085951c260
-
SHA512
0ea490cab1f887b3fec5d5f7a3f80c4f560128b211920eb9860aa1590a7693ce71a0e23ccafec39e2660b728b00a6e596ea67d96bec0fcc9f30c43d8e46218c5
-
SSDEEP
12288:alfG7uWRq4rk71OVelFSmOk6Eh8PJ2eLBxMY9Z1751qUm2BcvoeS5v5TlMxuKY:alfWuWlrNUlEmn8RH1xMeZ1dgSJ8ul
Score10/10-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1