General
-
Target
d194e1c281b540225601a7acd1da3126_JaffaCakes118
-
Size
2.2MB
-
Sample
240907-k4x9bawfqd
-
MD5
d194e1c281b540225601a7acd1da3126
-
SHA1
3e0ee558177530561c36b622f61a57a1c635f461
-
SHA256
728e4d205c69537943d7a5b1ff894b92d9b26a48b39f42e7f6fd997f15b9070c
-
SHA512
51f16be9ddc8a9f4f95c6aa61146a1fb666a696ac5c1d4bf098d75b70afe217fb2ffb8bbc3d199df1e4bcb7a5a317abf1b5400be573fcf5623abf52c952bad15
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ3:0UzeyQMS4DqodCnoe+iitjWwwL
Behavioral task
behavioral1
Sample
d194e1c281b540225601a7acd1da3126_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
d194e1c281b540225601a7acd1da3126_JaffaCakes118
-
Size
2.2MB
-
MD5
d194e1c281b540225601a7acd1da3126
-
SHA1
3e0ee558177530561c36b622f61a57a1c635f461
-
SHA256
728e4d205c69537943d7a5b1ff894b92d9b26a48b39f42e7f6fd997f15b9070c
-
SHA512
51f16be9ddc8a9f4f95c6aa61146a1fb666a696ac5c1d4bf098d75b70afe217fb2ffb8bbc3d199df1e4bcb7a5a317abf1b5400be573fcf5623abf52c952bad15
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ3:0UzeyQMS4DqodCnoe+iitjWwwL
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4