General
-
Target
93fc71c7abef0a2fb2f0a618a1d18139_JaffaCakes118
-
Size
339KB
-
Sample
240813-vpvjzs1blj
-
MD5
93fc71c7abef0a2fb2f0a618a1d18139
-
SHA1
36588c85f2293993475b345fe85be8c02f6bd7f9
-
SHA256
e03d8ab413dde35119ddf1454abe9b56b624c8979435c7bc5e63e2001c02d82c
-
SHA512
9156254fe37533c7ca442e8afb3d62e19c1695ffc94b8653180f8a0e1780bf8e57b28cec8f4236da7f23501ce240c50da162fa4e45ed5e02e2098734c0ec97eb
-
SSDEEP
6144:zLEchZLsu1AcKKIFrMg3p/UHLEhtfwjH5fc1zdLThGniSRxixV4naNiEGoZSKaUr:0iZLn1SKIFlUHLEk75UJdcniSRxuV4aT
Behavioral task
behavioral1
Sample
93fc71c7abef0a2fb2f0a618a1d18139_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
93fc71c7abef0a2fb2f0a618a1d18139_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
93fc71c7abef0a2fb2f0a618a1d18139_JaffaCakes118
-
Size
339KB
-
MD5
93fc71c7abef0a2fb2f0a618a1d18139
-
SHA1
36588c85f2293993475b345fe85be8c02f6bd7f9
-
SHA256
e03d8ab413dde35119ddf1454abe9b56b624c8979435c7bc5e63e2001c02d82c
-
SHA512
9156254fe37533c7ca442e8afb3d62e19c1695ffc94b8653180f8a0e1780bf8e57b28cec8f4236da7f23501ce240c50da162fa4e45ed5e02e2098734c0ec97eb
-
SSDEEP
6144:zLEchZLsu1AcKKIFrMg3p/UHLEhtfwjH5fc1zdLThGniSRxixV4naNiEGoZSKaUr:0iZLn1SKIFlUHLEk75UJdcniSRxuV4aT
Score10/10-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
5