General
-
Target
c2127146937e1438408fb3b0569d0816_JaffaCakes118
-
Size
526KB
-
Sample
240826-cj4xcsyfjg
-
MD5
c2127146937e1438408fb3b0569d0816
-
SHA1
59ad839546f713ac7aee357ea7c6b9a8b57dd920
-
SHA256
11929d279c1f017543e61e616ca046c4ce3ba983b5b847896337ed58e6f10086
-
SHA512
76e5a0c3e8aca949d6caa75b7cdd19fd04e3c821ff292223ad55c0b7989d4c7f575976fd8b0cf92a906d8d51e7a13ec9840d9d610eff926f56d93683b3e57e6a
-
SSDEEP
12288:Ym/jlqCU+PLDLd6TkaqcyKsN1OsEqDJiCCCCJ41:Zrlq94LUgoyKRGiCCCC
Static task
static1
Behavioral task
behavioral1
Sample
c2127146937e1438408fb3b0569d0816_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
latentbot
ztwerfdgdhfjkkl.zapto.org
1ztwerfdgdhfjkkl.zapto.org
2ztwerfdgdhfjkkl.zapto.org
3ztwerfdgdhfjkkl.zapto.org
4ztwerfdgdhfjkkl.zapto.org
5ztwerfdgdhfjkkl.zapto.org
6ztwerfdgdhfjkkl.zapto.org
7ztwerfdgdhfjkkl.zapto.org
8ztwerfdgdhfjkkl.zapto.org
Targets
-
-
Target
c2127146937e1438408fb3b0569d0816_JaffaCakes118
-
Size
526KB
-
MD5
c2127146937e1438408fb3b0569d0816
-
SHA1
59ad839546f713ac7aee357ea7c6b9a8b57dd920
-
SHA256
11929d279c1f017543e61e616ca046c4ce3ba983b5b847896337ed58e6f10086
-
SHA512
76e5a0c3e8aca949d6caa75b7cdd19fd04e3c821ff292223ad55c0b7989d4c7f575976fd8b0cf92a906d8d51e7a13ec9840d9d610eff926f56d93683b3e57e6a
-
SSDEEP
12288:Ym/jlqCU+PLDLd6TkaqcyKsN1OsEqDJiCCCCJ41:Zrlq94LUgoyKRGiCCCC
-
Modifies firewall policy service
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3