General
-
Target
b4d453087720b8fbf93147c039f4f8fb_JaffaCakes118
-
Size
6.6MB
-
Sample
240821-yqyvksxfma
-
MD5
b4d453087720b8fbf93147c039f4f8fb
-
SHA1
cfc9c30a92a61d0009bc4e21a1a808180d278218
-
SHA256
42da9414a2faba94899ebaa84cd32841ac30db80d655c5be4d32ef568cc35014
-
SHA512
1d498db675a631d91821786ef657d94814eadc8fc6062ad8256692bd5cf3e35632fce94e96d4672993b0fa36ed424cd7815d3ba81862ce0a75df4feebe9e9c51
-
SSDEEP
98304:9Xz+/uvg6x/emUKoJV5ElkmPNJgpEdneZi+H02YqAQcmJ3Q/mUfBA9qcu1ccH6i1:FK21H5WV5ElzMpYXY0fBQcb7BA2hHf
Static task
static1
Behavioral task
behavioral1
Sample
b4d453087720b8fbf93147c039f4f8fb_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b4d453087720b8fbf93147c039f4f8fb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
b4d453087720b8fbf93147c039f4f8fb_JaffaCakes118
-
Size
6.6MB
-
MD5
b4d453087720b8fbf93147c039f4f8fb
-
SHA1
cfc9c30a92a61d0009bc4e21a1a808180d278218
-
SHA256
42da9414a2faba94899ebaa84cd32841ac30db80d655c5be4d32ef568cc35014
-
SHA512
1d498db675a631d91821786ef657d94814eadc8fc6062ad8256692bd5cf3e35632fce94e96d4672993b0fa36ed424cd7815d3ba81862ce0a75df4feebe9e9c51
-
SSDEEP
98304:9Xz+/uvg6x/emUKoJV5ElkmPNJgpEdneZi+H02YqAQcmJ3Q/mUfBA9qcu1ccH6i1:FK21H5WV5ElzMpYXY0fBQcb7BA2hHf
-
Modifies Windows Firewall
-
Server Software Component: Terminal Services DLL
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies WinLogon
-
Hide Artifacts: Hidden Users
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
3Hidden Files and Directories
2Hidden Users
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2