General
-
Target
d9ccdcdcc70e00a5d15c55ada110e5cb_JaffaCakes118
-
Size
1.3MB
-
Sample
240911-hel4msxbpp
-
MD5
d9ccdcdcc70e00a5d15c55ada110e5cb
-
SHA1
49b4eab8f14f670ba7d1190cc35206153a6de8c4
-
SHA256
049bebcf35cf12f7f647fbb39779e8c4af0d2b400af54fb0521d6283b83974a7
-
SHA512
d632f00066b193f216e3410c1e21b42c4b0ca00d05ea29839e6249d3cf4f8a093ead981da0fe11a9b1785d0fe06bf2ff336a078c5f885828e21adfd2b4b7d42a
-
SSDEEP
12288:3ZWtI6Rk7unupOB06GOtBwunupOB06GOtBwunupOB061iYF+dnK4OB0B8:3uhapOlBSOlBSOFiVdK4O68
Behavioral task
behavioral1
Sample
d9ccdcdcc70e00a5d15c55ada110e5cb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9ccdcdcc70e00a5d15c55ada110e5cb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
d9ccdcdcc70e00a5d15c55ada110e5cb_JaffaCakes118
-
Size
1.3MB
-
MD5
d9ccdcdcc70e00a5d15c55ada110e5cb
-
SHA1
49b4eab8f14f670ba7d1190cc35206153a6de8c4
-
SHA256
049bebcf35cf12f7f647fbb39779e8c4af0d2b400af54fb0521d6283b83974a7
-
SHA512
d632f00066b193f216e3410c1e21b42c4b0ca00d05ea29839e6249d3cf4f8a093ead981da0fe11a9b1785d0fe06bf2ff336a078c5f885828e21adfd2b4b7d42a
-
SSDEEP
12288:3ZWtI6Rk7unupOB06GOtBwunupOB06GOtBwunupOB061iYF+dnK4OB0B8:3uhapOlBSOlBSOFiVdK4O68
-
Modifies visibility of file extensions in Explorer
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
1File Deletion
1Modify Registry
1