General
-
Target
d2948612e78f4c7cd0793bd6ea07df21_JaffaCakes118
-
Size
2.6MB
-
Sample
240907-w6a3caxhrq
-
MD5
d2948612e78f4c7cd0793bd6ea07df21
-
SHA1
13b4e161a061e063287cd3a8f7f2bce1153246c2
-
SHA256
9d0d961eef8d3f6dde2e0067ab96dee0ba762d140531a3a604cba0aba2d7e9b5
-
SHA512
7b0368cb45df0c504e5cdab83e790bb12d7f034f0b6d216da5c3b375e82783027e115555a8218ffc49091b84ef8a619ef722e2035d66c504d016289d51b0951d
-
SSDEEP
49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlZ:86SIROiFJiwp0xlrlZ
Behavioral task
behavioral1
Sample
d2948612e78f4c7cd0793bd6ea07df21_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
d2948612e78f4c7cd0793bd6ea07df21_JaffaCakes118
-
Size
2.6MB
-
MD5
d2948612e78f4c7cd0793bd6ea07df21
-
SHA1
13b4e161a061e063287cd3a8f7f2bce1153246c2
-
SHA256
9d0d961eef8d3f6dde2e0067ab96dee0ba762d140531a3a604cba0aba2d7e9b5
-
SHA512
7b0368cb45df0c504e5cdab83e790bb12d7f034f0b6d216da5c3b375e82783027e115555a8218ffc49091b84ef8a619ef722e2035d66c504d016289d51b0951d
-
SSDEEP
49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlZ:86SIROiFJiwp0xlrlZ
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4