General
-
Target
cbab138852a8ed4af3a0d0622a562bbb_JaffaCakes118
-
Size
2.2MB
-
Sample
240830-zxh85swanh
-
MD5
cbab138852a8ed4af3a0d0622a562bbb
-
SHA1
39a45afb4fdfcacb680a63ce6d7e4ec54ae429f9
-
SHA256
827bbfb3e510d1a374f62d6ebc04d01ef6e9b7cd5dd9ff42cb372395e1a2db08
-
SHA512
334544888bc535abc691c34227a8074432c3d7e12adc95e05bb777194e2dd9be4513f83e23b5f7074f229984fe1bc733d58128efadf000f9df8205356e7d9925
-
SSDEEP
49152:0UzeyQMS4DqodCnoe+iitjWwwDJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJB:02emwDJJJJJJJJJJJJJJJJJJJJJJJJJR
Behavioral task
behavioral1
Sample
cbab138852a8ed4af3a0d0622a562bbb_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
cbab138852a8ed4af3a0d0622a562bbb_JaffaCakes118
-
Size
2.2MB
-
MD5
cbab138852a8ed4af3a0d0622a562bbb
-
SHA1
39a45afb4fdfcacb680a63ce6d7e4ec54ae429f9
-
SHA256
827bbfb3e510d1a374f62d6ebc04d01ef6e9b7cd5dd9ff42cb372395e1a2db08
-
SHA512
334544888bc535abc691c34227a8074432c3d7e12adc95e05bb777194e2dd9be4513f83e23b5f7074f229984fe1bc733d58128efadf000f9df8205356e7d9925
-
SSDEEP
49152:0UzeyQMS4DqodCnoe+iitjWwwDJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJB:02emwDJJJJJJJJJJJJJJJJJJJJJJJJJR
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4