General
-
Target
bfeaeb3ec0c25caf769f9250f167e8de_JaffaCakes118
-
Size
687KB
-
Sample
240825-dllz1atcke
-
MD5
bfeaeb3ec0c25caf769f9250f167e8de
-
SHA1
73ee445b717e7036736fe84137f328c2ff99702f
-
SHA256
d3b3d716a35fdd2fbc78ffc0085cb63c701a01889e905a9031425071d5f9636c
-
SHA512
918cce4405b123df4e8031585e51ce66767ba81c3fa64e8ca57bc7e142f75135d66ead02fc389abdf85cbd04285df3f23d1f96522ca8399c980af1d759024115
-
SSDEEP
12288:vxyyytbuOdJsl08DOf5IQkI4kWOT7WooxEqzG:ZR4xJsS8iTkI4kWOfWoH
Static task
static1
Behavioral task
behavioral1
Sample
bfeaeb3ec0c25caf769f9250f167e8de_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bfeaeb3ec0c25caf769f9250f167e8de_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
bfeaeb3ec0c25caf769f9250f167e8de_JaffaCakes118
-
Size
687KB
-
MD5
bfeaeb3ec0c25caf769f9250f167e8de
-
SHA1
73ee445b717e7036736fe84137f328c2ff99702f
-
SHA256
d3b3d716a35fdd2fbc78ffc0085cb63c701a01889e905a9031425071d5f9636c
-
SHA512
918cce4405b123df4e8031585e51ce66767ba81c3fa64e8ca57bc7e142f75135d66ead02fc389abdf85cbd04285df3f23d1f96522ca8399c980af1d759024115
-
SSDEEP
12288:vxyyytbuOdJsl08DOf5IQkI4kWOT7WooxEqzG:ZR4xJsS8iTkI4kWOfWoH
Score10/10-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1