General
-
Target
d0de3a6cb436f2d0dac73bf37088ab33_JaffaCakes118
-
Size
2.6MB
-
Sample
240907-cpvkwazgqg
-
MD5
d0de3a6cb436f2d0dac73bf37088ab33
-
SHA1
89c8591beb0376c22b39eba97ec653e17a78f268
-
SHA256
c6577e199f9dc9a094d010478191da7016ff53080495f275df4aef98f77fa96a
-
SHA512
d0d67b1f222ddf1ba5c32da86a7503fe185a9eda9cd476fd7d89f5196d9b73cb49c6f7054531d7810ffcb357158d868a7e5427580fa14adf9f4d5bf1b35d9c6c
-
SSDEEP
49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlU:86SIROiFJiwp0xlrlU
Behavioral task
behavioral1
Sample
d0de3a6cb436f2d0dac73bf37088ab33_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
d0de3a6cb436f2d0dac73bf37088ab33_JaffaCakes118
-
Size
2.6MB
-
MD5
d0de3a6cb436f2d0dac73bf37088ab33
-
SHA1
89c8591beb0376c22b39eba97ec653e17a78f268
-
SHA256
c6577e199f9dc9a094d010478191da7016ff53080495f275df4aef98f77fa96a
-
SHA512
d0d67b1f222ddf1ba5c32da86a7503fe185a9eda9cd476fd7d89f5196d9b73cb49c6f7054531d7810ffcb357158d868a7e5427580fa14adf9f4d5bf1b35d9c6c
-
SSDEEP
49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlU:86SIROiFJiwp0xlrlU
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4