General
-
Target
a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118
-
Size
344KB
-
Sample
240816-2tfpyswbjn
-
MD5
a040033e4b0591f46ec02d3bd2e57071
-
SHA1
afe73adb0f0585ccf6df29eff7899555fe4e46af
-
SHA256
e851ceae9e8a50dddb1fa88b19159cfab209e2b9738acd00d7011ed9e74748e8
-
SHA512
bd3d0e34c7993baef72808ff7b1e5dae0cf3ae026c3c1e38816613f4944466550ac0ba1907549fc64cfa6713bf8c43cd5ac8d9fbf7c19194180ccf3304fcbe28
-
SSDEEP
6144:vCxOET2PRA8A3bLeQh81uhTx8+WYbwWVJqjhLzgAmw7V0pm2vMtI6FSg952P+T8V:v1PO8MeQh81uhNmq+jhfgKBovMtIu2OW
Behavioral task
behavioral1
Sample
a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118
-
Size
344KB
-
MD5
a040033e4b0591f46ec02d3bd2e57071
-
SHA1
afe73adb0f0585ccf6df29eff7899555fe4e46af
-
SHA256
e851ceae9e8a50dddb1fa88b19159cfab209e2b9738acd00d7011ed9e74748e8
-
SHA512
bd3d0e34c7993baef72808ff7b1e5dae0cf3ae026c3c1e38816613f4944466550ac0ba1907549fc64cfa6713bf8c43cd5ac8d9fbf7c19194180ccf3304fcbe28
-
SSDEEP
6144:vCxOET2PRA8A3bLeQh81uhTx8+WYbwWVJqjhLzgAmw7V0pm2vMtI6FSg952P+T8V:v1PO8MeQh81uhNmq+jhfgKBovMtIu2OW
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3