General
-
Target
bea565d32e631c6c8e250671b74cf4aa_JaffaCakes118
-
Size
446KB
-
Sample
240824-qalw3s1epd
-
MD5
bea565d32e631c6c8e250671b74cf4aa
-
SHA1
0fc4462320fa9882ded05c9337dbcc1054c2ea6d
-
SHA256
4539b7afa8869777612472ad3adab704bda180b868e1142de1661653e47a248a
-
SHA512
67aff04ba3324fdf96221ade9a832b0fcd7f2d6bef9b35dbb95454704d4d1a95583ccc264a136d364da5dacd307ddb74d52a7a710921a914d206aa4262f13e75
-
SSDEEP
12288:uAuZCQmYxl/NeLrobg7rir7BrdoR2plq8VD:uAul//irobSrirAon
Static task
static1
Behavioral task
behavioral1
Sample
bea565d32e631c6c8e250671b74cf4aa_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bea565d32e631c6c8e250671b74cf4aa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
bea565d32e631c6c8e250671b74cf4aa_JaffaCakes118
-
Size
446KB
-
MD5
bea565d32e631c6c8e250671b74cf4aa
-
SHA1
0fc4462320fa9882ded05c9337dbcc1054c2ea6d
-
SHA256
4539b7afa8869777612472ad3adab704bda180b868e1142de1661653e47a248a
-
SHA512
67aff04ba3324fdf96221ade9a832b0fcd7f2d6bef9b35dbb95454704d4d1a95583ccc264a136d364da5dacd307ddb74d52a7a710921a914d206aa4262f13e75
-
SSDEEP
12288:uAuZCQmYxl/NeLrobg7rir7BrdoR2plq8VD:uAul//irobSrirAon
Score10/10-
Modifies visiblity of hidden/system files in Explorer
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
4