General
-
Target
d2febfbed038426b50fa60c3edc4e2be_JaffaCakes118
-
Size
2.6MB
-
Sample
240907-2r5ajascpa
-
MD5
d2febfbed038426b50fa60c3edc4e2be
-
SHA1
836a73d44c10faba62770f28b86888003fe350df
-
SHA256
1085afdf1a24b77227172d606b8e0a30561b65d7d294bd3c4cca77f685ca97f3
-
SHA512
af5dcfccec6c5f962c8558dee45b9c5b335f56d948a73b8a0a4a5718a2b6a8b786bec72b45a63f9e0b5c960ce6d5d3c3b2a323ea76e939d1f215fac368a76f63
-
SSDEEP
49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlu:86SIROiFJiwp0xlrlu
Behavioral task
behavioral1
Sample
d2febfbed038426b50fa60c3edc4e2be_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
d2febfbed038426b50fa60c3edc4e2be_JaffaCakes118
-
Size
2.6MB
-
MD5
d2febfbed038426b50fa60c3edc4e2be
-
SHA1
836a73d44c10faba62770f28b86888003fe350df
-
SHA256
1085afdf1a24b77227172d606b8e0a30561b65d7d294bd3c4cca77f685ca97f3
-
SHA512
af5dcfccec6c5f962c8558dee45b9c5b335f56d948a73b8a0a4a5718a2b6a8b786bec72b45a63f9e0b5c960ce6d5d3c3b2a323ea76e939d1f215fac368a76f63
-
SSDEEP
49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlu:86SIROiFJiwp0xlrlu
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4