General
-
Target
e80ae0e554e1e50e1729d3fbbf717624_JaffaCakes118
-
Size
327KB
-
Sample
240918-bje3kavbmd
-
MD5
e80ae0e554e1e50e1729d3fbbf717624
-
SHA1
4a076b65726174302480f48384b125444b36a309
-
SHA256
1a8708424a44533f524fbf76276737e69d4f97588dd8b4a80f78b22e87b9cf2e
-
SHA512
fe62541b548783d4c9d61891325305beef11569595ffcd5b989523ad07e195f8f01de740a727c113a75aadc1aeb6d06a04f4f44dc5b5b2483b0143db504ca58c
-
SSDEEP
3072:j6TeodPeygFKkDwG+K2c2ZLRU3y/Xes1AQ7/oGOcHYl6kweaDjBwA4YDqsVfrih:js9CKMQDneUA6HYQrdHZ2sVjih
Static task
static1
Behavioral task
behavioral1
Sample
e80ae0e554e1e50e1729d3fbbf717624_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e80ae0e554e1e50e1729d3fbbf717624_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
im523
HacKed
windowsdotnet.ddns.net:1700
5bbde28dd0efc1008f97de5aa76d7b7c
-
reg_key
5bbde28dd0efc1008f97de5aa76d7b7c
-
splitter
|'|'|
Targets
-
-
Target
e80ae0e554e1e50e1729d3fbbf717624_JaffaCakes118
-
Size
327KB
-
MD5
e80ae0e554e1e50e1729d3fbbf717624
-
SHA1
4a076b65726174302480f48384b125444b36a309
-
SHA256
1a8708424a44533f524fbf76276737e69d4f97588dd8b4a80f78b22e87b9cf2e
-
SHA512
fe62541b548783d4c9d61891325305beef11569595ffcd5b989523ad07e195f8f01de740a727c113a75aadc1aeb6d06a04f4f44dc5b5b2483b0143db504ca58c
-
SSDEEP
3072:j6TeodPeygFKkDwG+K2c2ZLRU3y/Xes1AQ7/oGOcHYl6kweaDjBwA4YDqsVfrih:js9CKMQDneUA6HYQrdHZ2sVjih
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1