General
-
Target
d67e9db2e25e04a403ad2e79c5ffa6ca_JaffaCakes118
-
Size
2.2MB
-
Sample
240909-rnp2bssenn
-
MD5
d67e9db2e25e04a403ad2e79c5ffa6ca
-
SHA1
04e076f413004c991992e0eaba01ca8310de7219
-
SHA256
1d27a57eb5f1e175383f39235d1b0210ca321be647e3cbeec71a00fd800e3bbe
-
SHA512
8b4130048a3457527b243c42ac22e83da779cc2a2de3e34458879c6a27943083445b519c6292a55f13123133b9e07df4125d6867fda338b45ff2fc1f53255d52
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZL:0UzeyQMS4DqodCnoe+iitjWwwf
Behavioral task
behavioral1
Sample
d67e9db2e25e04a403ad2e79c5ffa6ca_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
d67e9db2e25e04a403ad2e79c5ffa6ca_JaffaCakes118
-
Size
2.2MB
-
MD5
d67e9db2e25e04a403ad2e79c5ffa6ca
-
SHA1
04e076f413004c991992e0eaba01ca8310de7219
-
SHA256
1d27a57eb5f1e175383f39235d1b0210ca321be647e3cbeec71a00fd800e3bbe
-
SHA512
8b4130048a3457527b243c42ac22e83da779cc2a2de3e34458879c6a27943083445b519c6292a55f13123133b9e07df4125d6867fda338b45ff2fc1f53255d52
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZL:0UzeyQMS4DqodCnoe+iitjWwwf
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4