General
-
Target
7544126164d5f44bb49b7b38f97a5db2_JaffaCakes118
-
Size
1.0MB
-
Sample
240726-xdq4ja1arc
-
MD5
7544126164d5f44bb49b7b38f97a5db2
-
SHA1
57890e9c73f1e1bcfc6d442bb8d58032424cd647
-
SHA256
cf050a29e9b608a4b80fbdf07a5065473faf13165f6e37c83a0677c58ee2067d
-
SHA512
7138a08156b6c56a35b1f405e03c1c2e43b6e997854612eb80cef67c4833277bbf7c79faf0a0562b4a5b5239920a0c0a5f1407c9154a5b7803d3c405fccc855b
-
SSDEEP
6144:GWZfec9EbXDk6RkQKVrG1VVE+IRuHOGrG1VVE+IYrG1VVE+ItuHO5rG1VVE+IRuw:3ZWtI6Rkru9O6uHuVONu9O6uHuVONu94
Behavioral task
behavioral1
Sample
7544126164d5f44bb49b7b38f97a5db2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7544126164d5f44bb49b7b38f97a5db2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
7544126164d5f44bb49b7b38f97a5db2_JaffaCakes118
-
Size
1.0MB
-
MD5
7544126164d5f44bb49b7b38f97a5db2
-
SHA1
57890e9c73f1e1bcfc6d442bb8d58032424cd647
-
SHA256
cf050a29e9b608a4b80fbdf07a5065473faf13165f6e37c83a0677c58ee2067d
-
SHA512
7138a08156b6c56a35b1f405e03c1c2e43b6e997854612eb80cef67c4833277bbf7c79faf0a0562b4a5b5239920a0c0a5f1407c9154a5b7803d3c405fccc855b
-
SSDEEP
6144:GWZfec9EbXDk6RkQKVrG1VVE+IRuHOGrG1VVE+IYrG1VVE+ItuHO5rG1VVE+IRuw:3ZWtI6Rkru9O6uHuVONu9O6uHuVONu94
-
Modifies visibility of file extensions in Explorer
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
1File Deletion
1Modify Registry
1