General
-
Target
e155c4befe9eee6a4d19329c98979de8_JaffaCakes118
-
Size
1.0MB
-
Sample
240915-ap3v5svhkq
-
MD5
e155c4befe9eee6a4d19329c98979de8
-
SHA1
9188ed77c1aad799067955834f968dc366d94f02
-
SHA256
f6e20f959d02f97d84331a3870761bd506517aa9c271ab7a51096fd9664a5930
-
SHA512
80905e0b3d9600c525d424d79eacb8205bf3462f6ef14601a7d079cf436782e57b28aa0b40cd19d01e48a8954e8bf93dbd8ff7d6663e6d442296d4d5eacd290e
-
SSDEEP
12288:UZWtI6Rk2erQZb+md4w1UaerQZb+md4w1UJla/ut:Uuha2erQZb+md4wmaerQZb+md4wmJUc
Static task
static1
Behavioral task
behavioral1
Sample
e155c4befe9eee6a4d19329c98979de8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e155c4befe9eee6a4d19329c98979de8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
e155c4befe9eee6a4d19329c98979de8_JaffaCakes118
-
Size
1.0MB
-
MD5
e155c4befe9eee6a4d19329c98979de8
-
SHA1
9188ed77c1aad799067955834f968dc366d94f02
-
SHA256
f6e20f959d02f97d84331a3870761bd506517aa9c271ab7a51096fd9664a5930
-
SHA512
80905e0b3d9600c525d424d79eacb8205bf3462f6ef14601a7d079cf436782e57b28aa0b40cd19d01e48a8954e8bf93dbd8ff7d6663e6d442296d4d5eacd290e
-
SSDEEP
12288:UZWtI6Rk2erQZb+md4w1UaerQZb+md4w1UJla/ut:Uuha2erQZb+md4wmaerQZb+md4wmJUc
-
Modifies visibility of file extensions in Explorer
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
1File Deletion
1Modify Registry
1