General
-
Target
cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118
-
Size
282KB
-
Sample
240831-v5751swgmm
-
MD5
cd459b5d7ce33980aa895c511dfbc715
-
SHA1
c797f1b77ed83e4dd0f6572a4a1f6f4cd26d9d70
-
SHA256
6bd7c4de6608a66b29d48912a5a38a1dcf523f4b24f531ec6ca2520193171beb
-
SHA512
1102c48caaaeaf5ec3bd85d6e824ab89c62244916427a72f7b3d9420ba7db42879087b336d98de7e6525d15b551b4f391ac29115b63741b0256eb3f6d5284ae6
-
SSDEEP
6144:Izf/4vSu9hHaZBynO1qQZq2kwJD7DOZa6emP/CvL:Izf/c9hHXQY2kqD7DOw6eeaT
Static task
static1
Behavioral task
behavioral1
Sample
cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118
-
Size
282KB
-
MD5
cd459b5d7ce33980aa895c511dfbc715
-
SHA1
c797f1b77ed83e4dd0f6572a4a1f6f4cd26d9d70
-
SHA256
6bd7c4de6608a66b29d48912a5a38a1dcf523f4b24f531ec6ca2520193171beb
-
SHA512
1102c48caaaeaf5ec3bd85d6e824ab89c62244916427a72f7b3d9420ba7db42879087b336d98de7e6525d15b551b4f391ac29115b63741b0256eb3f6d5284ae6
-
SSDEEP
6144:Izf/4vSu9hHaZBynO1qQZq2kwJD7DOZa6emP/CvL:Izf/c9hHXQY2kqD7DOw6eeaT
-
Modifies security service
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3