General
-
Target
8a147aabf983ae0b5d80ca7c920016b6_JaffaCakes118
-
Size
2.2MB
-
Sample
240811-mxpppswejr
-
MD5
8a147aabf983ae0b5d80ca7c920016b6
-
SHA1
ec879d5bfa801d30692d119c1761bd99ea509b44
-
SHA256
8651377079118fbcd225e4fa0388e84fcf9ae11913a0781c0ed05ffe990b28c6
-
SHA512
6937bc2933673f5f2d9691ae040407c52341f5a8c31ced8cae74c0acba3466beb086b0b10357db332bd680a201e426a4af430b01eeab34d1ceabe2b99f9a27db
-
SSDEEP
49152:8vBn0W4Q5wQktUfHAiB6WX5ljHLRodQ017X0qi0aXlAFpD/+Z:qN0meQn6WX5jEQ01/jpDWZ
Static task
static1
Behavioral task
behavioral1
Sample
8a147aabf983ae0b5d80ca7c920016b6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8a147aabf983ae0b5d80ca7c920016b6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://soft-store-inc.com/soft-usage/favicon.ico?0=1200&1=NNYJZAHP&2=i-s&3=72&4=7601&5=6&6=1&7=99600&8=1033
Extracted
http://soft-store-inc.com/soft-usage/favicon.ico?0=1200&1=ZEUYFSYD&2=i-s&3=72&4=9200&5=6&6=2&7=919041&8=1033
Targets
-
-
Target
8a147aabf983ae0b5d80ca7c920016b6_JaffaCakes118
-
Size
2.2MB
-
MD5
8a147aabf983ae0b5d80ca7c920016b6
-
SHA1
ec879d5bfa801d30692d119c1761bd99ea509b44
-
SHA256
8651377079118fbcd225e4fa0388e84fcf9ae11913a0781c0ed05ffe990b28c6
-
SHA512
6937bc2933673f5f2d9691ae040407c52341f5a8c31ced8cae74c0acba3466beb086b0b10357db332bd680a201e426a4af430b01eeab34d1ceabe2b99f9a27db
-
SSDEEP
49152:8vBn0W4Q5wQktUfHAiB6WX5ljHLRodQ017X0qi0aXlAFpD/+Z:qN0meQn6WX5jEQ01/jpDWZ
-
Modifies WinLogon for persistence
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Impair Defenses
1Indicator Removal
1File Deletion
1Modify Registry
2