General
-
Target
cf94b24d301707682b250c8ad897df69_JaffaCakes118
-
Size
2.2MB
-
Sample
240906-p514taxcmn
-
MD5
cf94b24d301707682b250c8ad897df69
-
SHA1
086a109e37a77800efb64fb836e2e504739ebb21
-
SHA256
33237ec9d634272f825dc19b99416962558ed4a18faa2760c216e9134a2fab87
-
SHA512
0bb2a62d81d719cd9b43cf89b4e8ef55473f3659d97e02c5cf3e544ce4c6d5f2d2d8d6939c0a978323972755c0385168b3a29df62f2afde034ce6c6eb0e80fcb
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZo:0UzeyQMS4DqodCnoe+iitjWww0
Behavioral task
behavioral1
Sample
cf94b24d301707682b250c8ad897df69_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
cf94b24d301707682b250c8ad897df69_JaffaCakes118
-
Size
2.2MB
-
MD5
cf94b24d301707682b250c8ad897df69
-
SHA1
086a109e37a77800efb64fb836e2e504739ebb21
-
SHA256
33237ec9d634272f825dc19b99416962558ed4a18faa2760c216e9134a2fab87
-
SHA512
0bb2a62d81d719cd9b43cf89b4e8ef55473f3659d97e02c5cf3e544ce4c6d5f2d2d8d6939c0a978323972755c0385168b3a29df62f2afde034ce6c6eb0e80fcb
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZo:0UzeyQMS4DqodCnoe+iitjWww0
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4