General
-
Target
b0afb5aafcd854e65057aadd9a68038b_JaffaCakes118
-
Size
151KB
-
Sample
240820-y316ga1fqf
-
MD5
b0afb5aafcd854e65057aadd9a68038b
-
SHA1
f00d78240735c8b41653a226769793e719b5b0a4
-
SHA256
bcbf89fb28d5c4e3b15bcce3dab09988e172da05bf139b01e935799e9ab81292
-
SHA512
99a0e9155e458160acd1e9a5197ba4d7fbaf55b9d30e74442c532e570e3748bfb20e02b1742fcfb642b6f9f61cbe5f030c1e675e59749bce003f7e6d23eeeff4
-
SSDEEP
3072:Y/NLxbeN3Z0l+wLslelQgJFlOK4aesYtJ2YYGJqbMi:MNLxbapPwLGehFT4FsYT2Ye
Static task
static1
Behavioral task
behavioral1
Sample
b0afb5aafcd854e65057aadd9a68038b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b0afb5aafcd854e65057aadd9a68038b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
latentbot
sdfsadfasdf.zapto.org
Targets
-
-
Target
b0afb5aafcd854e65057aadd9a68038b_JaffaCakes118
-
Size
151KB
-
MD5
b0afb5aafcd854e65057aadd9a68038b
-
SHA1
f00d78240735c8b41653a226769793e719b5b0a4
-
SHA256
bcbf89fb28d5c4e3b15bcce3dab09988e172da05bf139b01e935799e9ab81292
-
SHA512
99a0e9155e458160acd1e9a5197ba4d7fbaf55b9d30e74442c532e570e3748bfb20e02b1742fcfb642b6f9f61cbe5f030c1e675e59749bce003f7e6d23eeeff4
-
SSDEEP
3072:Y/NLxbeN3Z0l+wLslelQgJFlOK4aesYtJ2YYGJqbMi:MNLxbapPwLGehFT4FsYT2Ye
-
Adds policy Run key to start application
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5