General
-
Target
970fdc305af59de34a6ede26427d54f1_JaffaCakes118
-
Size
160KB
-
Sample
240814-wd2plavfmd
-
MD5
970fdc305af59de34a6ede26427d54f1
-
SHA1
fa8129ab356bc4f7f191c34e1550f84bfade1123
-
SHA256
9356e999257918f3fb9360a2ab1e215f775247f6ce3ad05155e3fac2e9a7bbc6
-
SHA512
6c301fe665f2b8334693ca5e2f0aaa3527dd4276e0ce2200b35a5597de2ad799316ebbbcba4e081b9a866c377fe9eda4f2c9dc26ab753751042f2c2ffe61cd10
-
SSDEEP
1536:vFcsYqm5fiy0ZQwSkADSjq3tLmOhy7QK1YtnKr3oJ789wjTX66h/qXfRQ:v80ZQ2kL3RmOhF4YQMJg9MTK7Q
Static task
static1
Behavioral task
behavioral1
Sample
970fdc305af59de34a6ede26427d54f1_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
970fdc305af59de34a6ede26427d54f1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
970fdc305af59de34a6ede26427d54f1_JaffaCakes118
-
Size
160KB
-
MD5
970fdc305af59de34a6ede26427d54f1
-
SHA1
fa8129ab356bc4f7f191c34e1550f84bfade1123
-
SHA256
9356e999257918f3fb9360a2ab1e215f775247f6ce3ad05155e3fac2e9a7bbc6
-
SHA512
6c301fe665f2b8334693ca5e2f0aaa3527dd4276e0ce2200b35a5597de2ad799316ebbbcba4e081b9a866c377fe9eda4f2c9dc26ab753751042f2c2ffe61cd10
-
SSDEEP
1536:vFcsYqm5fiy0ZQwSkADSjq3tLmOhy7QK1YtnKr3oJ789wjTX66h/qXfRQ:v80ZQ2kL3RmOhF4YQMJg9MTK7Q
Score10/10-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7