General
-
Target
45952549fd27f41cbcd2a4ad44331c59_JaffaCakes118
-
Size
2.2MB
-
Sample
240729-paa9xasakh
-
MD5
45952549fd27f41cbcd2a4ad44331c59
-
SHA1
2f512789784d8940bf63d8092d3c6f686cc50387
-
SHA256
1a198ecee66fc8ec13774ac287557d82678d9b2a2f0192f9b180cc046840a36a
-
SHA512
c6fa1f76ee6cbdc06df20f0c7c8ef161132f3c241ad8bde349f9d28818675d7dd4b321223c5ea00e55c975a3279a8da29fed7cc856ad5290f855aa7af6a044da
-
SSDEEP
49152:LYBmOuoX4kn2po7rdrhNu5HjHyQhojw8p/R3nsQ7ra3oF6QlNWOJOcUr:LYBmOWJ2SJo3NsQkoPoOJM
Static task
static1
Behavioral task
behavioral1
Sample
45952549fd27f41cbcd2a4ad44331c59_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
45952549fd27f41cbcd2a4ad44331c59_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
45952549fd27f41cbcd2a4ad44331c59_JaffaCakes118
-
Size
2.2MB
-
MD5
45952549fd27f41cbcd2a4ad44331c59
-
SHA1
2f512789784d8940bf63d8092d3c6f686cc50387
-
SHA256
1a198ecee66fc8ec13774ac287557d82678d9b2a2f0192f9b180cc046840a36a
-
SHA512
c6fa1f76ee6cbdc06df20f0c7c8ef161132f3c241ad8bde349f9d28818675d7dd4b321223c5ea00e55c975a3279a8da29fed7cc856ad5290f855aa7af6a044da
-
SSDEEP
49152:LYBmOuoX4kn2po7rdrhNu5HjHyQhojw8p/R3nsQ7ra3oF6QlNWOJOcUr:LYBmOWJ2SJo3NsQkoPoOJM
Score10/10-
BitRAT payload
-
Modifies WinLogon for persistence
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1