General
-
Target
d9a8edbaab077b8601bac5369b1636e9_JaffaCakes118
-
Size
48KB
-
Sample
240911-fnl4wstenm
-
MD5
d9a8edbaab077b8601bac5369b1636e9
-
SHA1
b5f8dd5f6e3fd4a794a3eadce1e26a34bfb7dc7e
-
SHA256
7134e8b04c259a4d339f12f138ee2d15f150df7b17063eac4c656711aebd24c4
-
SHA512
e097cbaf056a394230f02b2b46a2299f950327d2ccb43817759cc0d000ce42265c59b188f28968ae88a21889eda80d7049cd505f2096a92de4850cb61753da6e
-
SSDEEP
1536:cG93SLvzB6vzPBqNPOo6jK3OXBb62feVaGP7I9XWrz4+w:cG93SLvzGD+POo66OXVUaGPM9XWrz4d
Static task
static1
Behavioral task
behavioral1
Sample
d9a8edbaab077b8601bac5369b1636e9_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9a8edbaab077b8601bac5369b1636e9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
d9a8edbaab077b8601bac5369b1636e9_JaffaCakes118
-
Size
48KB
-
MD5
d9a8edbaab077b8601bac5369b1636e9
-
SHA1
b5f8dd5f6e3fd4a794a3eadce1e26a34bfb7dc7e
-
SHA256
7134e8b04c259a4d339f12f138ee2d15f150df7b17063eac4c656711aebd24c4
-
SHA512
e097cbaf056a394230f02b2b46a2299f950327d2ccb43817759cc0d000ce42265c59b188f28968ae88a21889eda80d7049cd505f2096a92de4850cb61753da6e
-
SSDEEP
1536:cG93SLvzB6vzPBqNPOo6jK3OXBb62feVaGP7I9XWrz4+w:cG93SLvzGD+POo66OXVUaGPM9XWrz4d
Score8/10-
Blocklisted process makes network request
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2AppInit DLLs
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2AppInit DLLs
1Netsh Helper DLL
1