General
-
Target
89482da238d334f25a7f751c86e0c675_JaffaCakes118
-
Size
568KB
-
Sample
240811-gtn14ssbjc
-
MD5
89482da238d334f25a7f751c86e0c675
-
SHA1
900713240e390c330a0112006f494e52895820b0
-
SHA256
ae4b706678e6e22a9ab570f26d314cd2ad20e4280042592489e15a02d9970de0
-
SHA512
7190519585f13bd2ed8c56b407bdbd0a47679ac8f607e8de9cb400178d3a5e0988aadc67ef5573fbc49f2b1bb98a2b54ce49354131a9e7ff0a63ad89d3b4fbcf
-
SSDEEP
12288:XgHy9zoijsIvRCO7lhyj3nLSTBnxmncFMBCwaODxRSqCRxh51:rqERC8lhM3nGTBnxgCShcH
Static task
static1
Behavioral task
behavioral1
Sample
89482da238d334f25a7f751c86e0c675_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
89482da238d334f25a7f751c86e0c675_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
89482da238d334f25a7f751c86e0c675_JaffaCakes118
-
Size
568KB
-
MD5
89482da238d334f25a7f751c86e0c675
-
SHA1
900713240e390c330a0112006f494e52895820b0
-
SHA256
ae4b706678e6e22a9ab570f26d314cd2ad20e4280042592489e15a02d9970de0
-
SHA512
7190519585f13bd2ed8c56b407bdbd0a47679ac8f607e8de9cb400178d3a5e0988aadc67ef5573fbc49f2b1bb98a2b54ce49354131a9e7ff0a63ad89d3b4fbcf
-
SSDEEP
12288:XgHy9zoijsIvRCO7lhyj3nLSTBnxmncFMBCwaODxRSqCRxh51:rqERC8lhM3nGTBnxgCShcH
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1