General
-
Target
d308d96b1772ecdc63ebb81b1069e7c9_JaffaCakes118
-
Size
2.3MB
-
Sample
240907-28a31starf
-
MD5
d308d96b1772ecdc63ebb81b1069e7c9
-
SHA1
7df9e6dd127c3e5ada3bc63f1df8f6a6517eb10d
-
SHA256
59959c0b5519999aa75d7e51b27d786ea8365e80cbafc44baeb0e252c7eedab3
-
SHA512
551c30d7bf41b51985d34e416fdbaa4d70396d0f0a071286518fe64de7cbbbfc53f7fd8bfbe22ee42a2f618c1b889d2464486ee448572bb1a1506af546629f96
-
SSDEEP
49152:4ko5ZasrwscqzHD3lSOKzIvjJcQ7ZnQ5DGzbQTK1e:4p5ws7tYOKzwL7Z+evU
Static task
static1
Behavioral task
behavioral1
Sample
d308d96b1772ecdc63ebb81b1069e7c9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d308d96b1772ecdc63ebb81b1069e7c9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://galaint.onlinesecstats.info/?0=127&1=0&2=1&3=66&4=i&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=1111&12=giqeilpxxf&14=1
Targets
-
-
Target
d308d96b1772ecdc63ebb81b1069e7c9_JaffaCakes118
-
Size
2.3MB
-
MD5
d308d96b1772ecdc63ebb81b1069e7c9
-
SHA1
7df9e6dd127c3e5ada3bc63f1df8f6a6517eb10d
-
SHA256
59959c0b5519999aa75d7e51b27d786ea8365e80cbafc44baeb0e252c7eedab3
-
SHA512
551c30d7bf41b51985d34e416fdbaa4d70396d0f0a071286518fe64de7cbbbfc53f7fd8bfbe22ee42a2f618c1b889d2464486ee448572bb1a1506af546629f96
-
SSDEEP
49152:4ko5ZasrwscqzHD3lSOKzIvjJcQ7ZnQ5DGzbQTK1e:4p5ws7tYOKzwL7Z+evU
-
Disables taskbar notifications via registry modification
-
Event Triggered Execution: Image File Execution Options Injection
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1