General
-
Target
a4aac6c19aaf489a1292b85323ed2a5d_JaffaCakes118
-
Size
487KB
-
Sample
240818-amfylavdqh
-
MD5
a4aac6c19aaf489a1292b85323ed2a5d
-
SHA1
acdc8881df02bcbf6e5f1ffe070f905101ec101d
-
SHA256
52074ffa2beddc543065364dc0b59dc60194d2e636df9dbfb0394b7cf514e7e8
-
SHA512
3333c4f0484b93a800c811154fd9d941440488da9a2e58d33a5a9b318f5ca596efd5f8ce2c1e02960f68b363dc3e6311fd94bb0b00f39c68a127de21a37e5e33
-
SSDEEP
6144:Z/66ZmCUexQqTjoOYSl8zTE7W+SYd7M8OmLAyTbxJm4/Icmg2m7MSd9bGx0wxHNa:Z/A0TE7IMsStm7QRe5K0wxqwe
Static task
static1
Behavioral task
behavioral1
Sample
a4aac6c19aaf489a1292b85323ed2a5d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a4aac6c19aaf489a1292b85323ed2a5d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
a4aac6c19aaf489a1292b85323ed2a5d_JaffaCakes118
-
Size
487KB
-
MD5
a4aac6c19aaf489a1292b85323ed2a5d
-
SHA1
acdc8881df02bcbf6e5f1ffe070f905101ec101d
-
SHA256
52074ffa2beddc543065364dc0b59dc60194d2e636df9dbfb0394b7cf514e7e8
-
SHA512
3333c4f0484b93a800c811154fd9d941440488da9a2e58d33a5a9b318f5ca596efd5f8ce2c1e02960f68b363dc3e6311fd94bb0b00f39c68a127de21a37e5e33
-
SSDEEP
6144:Z/66ZmCUexQqTjoOYSl8zTE7W+SYd7M8OmLAyTbxJm4/Icmg2m7MSd9bGx0wxHNa:Z/A0TE7IMsStm7QRe5K0wxqwe
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1