General
-
Target
b57a2981ed5fff98b4b4aa6a52a1a950_JaffaCakes118
-
Size
537KB
-
Sample
240821-3g5nzswfrg
-
MD5
b57a2981ed5fff98b4b4aa6a52a1a950
-
SHA1
c175f272f3164dc2fe0f82df26561d7bfe7e9ef5
-
SHA256
ee1f9d440c14ace09e4d92985900363101ca4baf351aa28c844a760b1629c879
-
SHA512
ec1e1e3eff2539e3fa2b2dfabb356dddd09d55ae16eba51f6310ca8cc5a0e5dca76fd8aff65b33952f4edf068d72eea15096791763c981cb114a2d905bf364cd
-
SSDEEP
6144:GWZfec9EbXDk6RkQKVrG1VVE+IwrG1VVE+IwrG1VVE+I9/UOPSe570Szp3irG1VR:3ZWtI6RkrununuROB0Jut
Behavioral task
behavioral1
Sample
b57a2981ed5fff98b4b4aa6a52a1a950_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b57a2981ed5fff98b4b4aa6a52a1a950_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
b57a2981ed5fff98b4b4aa6a52a1a950_JaffaCakes118
-
Size
537KB
-
MD5
b57a2981ed5fff98b4b4aa6a52a1a950
-
SHA1
c175f272f3164dc2fe0f82df26561d7bfe7e9ef5
-
SHA256
ee1f9d440c14ace09e4d92985900363101ca4baf351aa28c844a760b1629c879
-
SHA512
ec1e1e3eff2539e3fa2b2dfabb356dddd09d55ae16eba51f6310ca8cc5a0e5dca76fd8aff65b33952f4edf068d72eea15096791763c981cb114a2d905bf364cd
-
SSDEEP
6144:GWZfec9EbXDk6RkQKVrG1VVE+IwrG1VVE+IwrG1VVE+I9/UOPSe570Szp3irG1VR:3ZWtI6RkrununuROB0Jut
-
Modifies visibility of file extensions in Explorer
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
1File Deletion
1Modify Registry
1