General
-
Target
84f755ce53cb1d70ba895c0f0f629595_JaffaCakes118
-
Size
273KB
-
Sample
240810-f9v9pa1hqf
-
MD5
84f755ce53cb1d70ba895c0f0f629595
-
SHA1
3fdf3e27b1541d52c9a865951a2bdee107c37473
-
SHA256
5f9f5634db8e30d9d11a63baa794863ecf4855637f95e81b6fe667d9f85cab72
-
SHA512
cd2cee1a1a8e4b53118b1a463fcf767a3fc72566663d16f5cbc563d79f2b9c47e4c1a60dbbd4c61faebcc1488a842783f9984433e2d52c2b5148918d3fb99de7
-
SSDEEP
6144:/BNw2vyd8KCg4pI4UJr22Ssdk/JplhD/zntJCkTSwKUxSwc:TwQyfdXCpj7nBNxS
Behavioral task
behavioral1
Sample
84f755ce53cb1d70ba895c0f0f629595_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
84f755ce53cb1d70ba895c0f0f629595_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
84f755ce53cb1d70ba895c0f0f629595_JaffaCakes118
-
Size
273KB
-
MD5
84f755ce53cb1d70ba895c0f0f629595
-
SHA1
3fdf3e27b1541d52c9a865951a2bdee107c37473
-
SHA256
5f9f5634db8e30d9d11a63baa794863ecf4855637f95e81b6fe667d9f85cab72
-
SHA512
cd2cee1a1a8e4b53118b1a463fcf767a3fc72566663d16f5cbc563d79f2b9c47e4c1a60dbbd4c61faebcc1488a842783f9984433e2d52c2b5148918d3fb99de7
-
SSDEEP
6144:/BNw2vyd8KCg4pI4UJr22Ssdk/JplhD/zntJCkTSwKUxSwc:TwQyfdXCpj7nBNxS
-
Modifies firewall policy service
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
2Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
4