General
-
Target
af8b6df755cc465a0ccb5772c272d50d_JaffaCakes118
-
Size
15.0MB
-
Sample
240820-rkkx7swena
-
MD5
af8b6df755cc465a0ccb5772c272d50d
-
SHA1
66c47d68fa9e0134ac65b36c72a3c440adb89cba
-
SHA256
d34f204c379a0efa108374e436319aa5910bf896d8ee1cb4bdc4032df5e147eb
-
SHA512
ebf2da3cfb78bddaff3cc5f578c45f4c9d57fbedd85618034d9700ffeb1e35971bb5a26fdca34f2da5eac5b382314f6fb8fe92ef9af40b19f4e20d8c3bc7cbf7
-
SSDEEP
12288:rUR4+0lGrUPDHQahTzrdCcrFy55555555555555555555555555555555555555p:rl+PrmrXrd1p
Static task
static1
Behavioral task
behavioral1
Sample
af8b6df755cc465a0ccb5772c272d50d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
af8b6df755cc465a0ccb5772c272d50d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Targets
-
-
Target
af8b6df755cc465a0ccb5772c272d50d_JaffaCakes118
-
Size
15.0MB
-
MD5
af8b6df755cc465a0ccb5772c272d50d
-
SHA1
66c47d68fa9e0134ac65b36c72a3c440adb89cba
-
SHA256
d34f204c379a0efa108374e436319aa5910bf896d8ee1cb4bdc4032df5e147eb
-
SHA512
ebf2da3cfb78bddaff3cc5f578c45f4c9d57fbedd85618034d9700ffeb1e35971bb5a26fdca34f2da5eac5b382314f6fb8fe92ef9af40b19f4e20d8c3bc7cbf7
-
SSDEEP
12288:rUR4+0lGrUPDHQahTzrdCcrFy55555555555555555555555555555555555555p:rl+PrmrXrd1p
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2