General
-
Target
bf97d56c1cd112197f951653c2080814_JaffaCakes118
-
Size
748KB
-
Sample
240824-2vbsdstgrb
-
MD5
bf97d56c1cd112197f951653c2080814
-
SHA1
08c28f3682b67fbc835f27e292eb4159389f62d9
-
SHA256
1669137d9d09ee215a11a0ec6685beac90196666c1d4d0afced0f633a7c8543a
-
SHA512
870add48eae58b1563ec98d9261ca59223c673baee1ad7f7b377506fbf00a61497c3f9531be66c4d80d692e20468056e3a55d0bc9e80a7e8bc4bfcf10ac171ed
-
SSDEEP
12288:rJ7neJelBrH9xbLDDu7JHixkVB4Fa6QmunUy9ZExR0HJDNrFJZndtbqOTSgcDU:r9x76FCWVg5unUyjK0tzJ5Lr2RU
Static task
static1
Behavioral task
behavioral1
Sample
bf97d56c1cd112197f951653c2080814_JaffaCakes118.jar
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bf97d56c1cd112197f951653c2080814_JaffaCakes118.jar
Resource
win10v2004-20240802-en
Malware Config
Extracted
latentbot
ebukaalilonu.zapto.org
Targets
-
-
Target
bf97d56c1cd112197f951653c2080814_JaffaCakes118
-
Size
748KB
-
MD5
bf97d56c1cd112197f951653c2080814
-
SHA1
08c28f3682b67fbc835f27e292eb4159389f62d9
-
SHA256
1669137d9d09ee215a11a0ec6685beac90196666c1d4d0afced0f633a7c8543a
-
SHA512
870add48eae58b1563ec98d9261ca59223c673baee1ad7f7b377506fbf00a61497c3f9531be66c4d80d692e20468056e3a55d0bc9e80a7e8bc4bfcf10ac171ed
-
SSDEEP
12288:rJ7neJelBrH9xbLDDu7JHixkVB4Fa6QmunUy9ZExR0HJDNrFJZndtbqOTSgcDU:r9x76FCWVg5unUyjK0tzJ5Lr2RU
Score10/10-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1