General
-
Target
c968bdd136576d97edffbc1265f7e024_JaffaCakes118
-
Size
2.2MB
-
Sample
240829-xe98sswbkc
-
MD5
c968bdd136576d97edffbc1265f7e024
-
SHA1
50f629db77f75bcf65bd2d44f4412ce07daf8bac
-
SHA256
1c0a694d893849c7dbf4536cbc35d0ee5abda7524371f6726d35ef5bc6a65767
-
SHA512
f2696ba5acb37497f0520fbfa01648021ba7c8f43052a594c6f051b935084918e9c82eff5577f68e606f8614bc8e37477925918fbc12716b32b6ed50d6d10dcd
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZW:0UzeyQMS4DqodCnoe+iitjWwwi
Behavioral task
behavioral1
Sample
c968bdd136576d97edffbc1265f7e024_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
c968bdd136576d97edffbc1265f7e024_JaffaCakes118
-
Size
2.2MB
-
MD5
c968bdd136576d97edffbc1265f7e024
-
SHA1
50f629db77f75bcf65bd2d44f4412ce07daf8bac
-
SHA256
1c0a694d893849c7dbf4536cbc35d0ee5abda7524371f6726d35ef5bc6a65767
-
SHA512
f2696ba5acb37497f0520fbfa01648021ba7c8f43052a594c6f051b935084918e9c82eff5577f68e606f8614bc8e37477925918fbc12716b32b6ed50d6d10dcd
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZW:0UzeyQMS4DqodCnoe+iitjWwwi
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4