General
-
Target
cff25e1124d4ea17e34cfd412898ed3e_JaffaCakes118
-
Size
372KB
-
Sample
240906-trvr4awbpl
-
MD5
cff25e1124d4ea17e34cfd412898ed3e
-
SHA1
305f1a56b73b9d0528eca735e774b6712ca1fcb3
-
SHA256
76b44ea89c643596a81f26a4a5b49d1273298e8468d1e98bbb1728167464037a
-
SHA512
d1e995f3c8673949cf58af917923d17246efb6d12fcff3b2215358bdb4efc3b56e4601893c22741a8628a94de24d6b74cc1eb12f53a242aba4540316766ab782
-
SSDEEP
6144:zKdnFVQ0a++SNIepN5J5VdhYBCWyynWYMCytCjt3vwqPruaQ3JP0UwWa8WOa:zcFV+NSVpNrYBeyWIyatoErGMUwWZWOa
Static task
static1
Behavioral task
behavioral1
Sample
cff25e1124d4ea17e34cfd412898ed3e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cff25e1124d4ea17e34cfd412898ed3e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
latentbot
adolfhitlerhaxor.zapto.org
Targets
-
-
Target
cff25e1124d4ea17e34cfd412898ed3e_JaffaCakes118
-
Size
372KB
-
MD5
cff25e1124d4ea17e34cfd412898ed3e
-
SHA1
305f1a56b73b9d0528eca735e774b6712ca1fcb3
-
SHA256
76b44ea89c643596a81f26a4a5b49d1273298e8468d1e98bbb1728167464037a
-
SHA512
d1e995f3c8673949cf58af917923d17246efb6d12fcff3b2215358bdb4efc3b56e4601893c22741a8628a94de24d6b74cc1eb12f53a242aba4540316766ab782
-
SSDEEP
6144:zKdnFVQ0a++SNIepN5J5VdhYBCWyynWYMCytCjt3vwqPruaQ3JP0UwWa8WOa:zcFV+NSVpNrYBeyWIyatoErGMUwWZWOa
Score10/10-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1