General
-
Target
cf1edf31aa7092e52d4f1d4206051625_JaffaCakes118
-
Size
2.6MB
-
Sample
240906-kgbf2awhmg
-
MD5
cf1edf31aa7092e52d4f1d4206051625
-
SHA1
5b2a7b2a0e309443a09a00bded57e2a1ca132ef5
-
SHA256
9c0a8500d53a5d76e914efadf4238b599cf168065ec7a0953e4e89e719d6777d
-
SHA512
9ef1fbb503b9999bd7bbe5d49b51b81cac5da1dc76d5f5443d20cda13a4e827c53e526076ead492f4026295d3074645f112a8fc3cb6eae996c93b379c8a7923b
-
SSDEEP
49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrll:86SIROiFJiwp0xlrll
Behavioral task
behavioral1
Sample
cf1edf31aa7092e52d4f1d4206051625_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
cf1edf31aa7092e52d4f1d4206051625_JaffaCakes118
-
Size
2.6MB
-
MD5
cf1edf31aa7092e52d4f1d4206051625
-
SHA1
5b2a7b2a0e309443a09a00bded57e2a1ca132ef5
-
SHA256
9c0a8500d53a5d76e914efadf4238b599cf168065ec7a0953e4e89e719d6777d
-
SHA512
9ef1fbb503b9999bd7bbe5d49b51b81cac5da1dc76d5f5443d20cda13a4e827c53e526076ead492f4026295d3074645f112a8fc3cb6eae996c93b379c8a7923b
-
SSDEEP
49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrll:86SIROiFJiwp0xlrll
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4