General
-
Target
ce2b63e869ede1eb6f3691638dde2acc_JaffaCakes118
-
Size
2.2MB
-
Sample
240905-3p1d8svbjp
-
MD5
ce2b63e869ede1eb6f3691638dde2acc
-
SHA1
8be0f4dc89e8d9c683d4a574d1f1090e71797e0d
-
SHA256
d8fd65f0a63ff3ccdf99312a11da3308a0cfe16caf4d048d37554e67a5095559
-
SHA512
ca1eca068740132e8be0989bf6d0bcfbbf2abf9ee3fc9125cb079a5ba4d66e0d76373d5ae5b64f905ee8a3b3670171471c8e39ea4e713d148879e9be7cc600a9
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZD:0UzeyQMS4DqodCnoe+iitjWwwn
Behavioral task
behavioral1
Sample
ce2b63e869ede1eb6f3691638dde2acc_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
ce2b63e869ede1eb6f3691638dde2acc_JaffaCakes118
-
Size
2.2MB
-
MD5
ce2b63e869ede1eb6f3691638dde2acc
-
SHA1
8be0f4dc89e8d9c683d4a574d1f1090e71797e0d
-
SHA256
d8fd65f0a63ff3ccdf99312a11da3308a0cfe16caf4d048d37554e67a5095559
-
SHA512
ca1eca068740132e8be0989bf6d0bcfbbf2abf9ee3fc9125cb079a5ba4d66e0d76373d5ae5b64f905ee8a3b3670171471c8e39ea4e713d148879e9be7cc600a9
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZD:0UzeyQMS4DqodCnoe+iitjWwwn
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4