General
-
Target
b2bd46e4156648e001ed731a637f30ce_JaffaCakes118
-
Size
2.6MB
-
Sample
240821-j7rp9ssckr
-
MD5
b2bd46e4156648e001ed731a637f30ce
-
SHA1
fbf107993c2ba05c020752ff5139ce3f07bdbbef
-
SHA256
e8079ed79b19b4dee2b023bf633be8d93e624cba8ca8963c05a62cfcc8b3b008
-
SHA512
0c72a98a3a2c903020528e7790ef1559a4cfdd42ae5c4888b9e5cbe725a4b40625b2447eff4a47544450057c9ee3d30fcdb61661be81e899145b066c109ed2d6
-
SSDEEP
49152:Lidw4KIvVbsaJukZoxA1pzCW9cPBBcuXwUdt515LspMKjnAV7:edwAVbnIkuxA1pzV9eBN5LspMbV7
Static task
static1
Behavioral task
behavioral1
Sample
b2bd46e4156648e001ed731a637f30ce_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b2bd46e4156648e001ed731a637f30ce_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://soft-store-inc.com/soft-usage/favicon.ico?0=1200&1=EXCFTDUU&2=i-s&3=115&4=7601&5=6&6=1&7=99600&8=1033
Extracted
http://soft-store-inc.com/soft-usage/favicon.ico?0=1200&1=ZEUYFSYD&2=i-s&3=115&4=9200&5=6&6=2&7=919041&8=1033
Targets
-
-
Target
b2bd46e4156648e001ed731a637f30ce_JaffaCakes118
-
Size
2.6MB
-
MD5
b2bd46e4156648e001ed731a637f30ce
-
SHA1
fbf107993c2ba05c020752ff5139ce3f07bdbbef
-
SHA256
e8079ed79b19b4dee2b023bf633be8d93e624cba8ca8963c05a62cfcc8b3b008
-
SHA512
0c72a98a3a2c903020528e7790ef1559a4cfdd42ae5c4888b9e5cbe725a4b40625b2447eff4a47544450057c9ee3d30fcdb61661be81e899145b066c109ed2d6
-
SSDEEP
49152:Lidw4KIvVbsaJukZoxA1pzCW9cPBBcuXwUdt515LspMKjnAV7:edwAVbnIkuxA1pzV9eBN5LspMbV7
-
Modifies WinLogon for persistence
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Impair Defenses
1Indicator Removal
1File Deletion
1Modify Registry
2