General
-
Target
e895c178b33b244a3e5debbe2f42fdbe_JaffaCakes118
-
Size
305KB
-
Sample
240918-h2adcsycqf
-
MD5
e895c178b33b244a3e5debbe2f42fdbe
-
SHA1
2a0879e4e0a1fc69355539a3152d429ea9ad046c
-
SHA256
646536c21d67f25b398e37269f50d54ab04082acf880a131c934332106527760
-
SHA512
e01fbaeabd616da8cc81f0bfe083b8b8165868656a2ae1f490f559a5b2209f66fd603299fdbf1b7d8284a29c10c08277b702f95952eeb925d940866828bb1308
-
SSDEEP
6144:jb8Wt7QP7gCO5cOFmRnptuXHejp2J2iPHpc6iOIsaerGQlsFa5dsMcp:jb8WBxCOSRnptO+jp2oScDOdaerGQ8ag
Static task
static1
Behavioral task
behavioral1
Sample
e895c178b33b244a3e5debbe2f42fdbe_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
latentbot
1inzanity09.zapto.org
2inzanity09.zapto.org
3inzanity09.zapto.org
4inzanity09.zapto.org
5inzanity09.zapto.org
6inzanity09.zapto.org
7inzanity09.zapto.org
8inzanity09.zapto.org
Targets
-
-
Target
e895c178b33b244a3e5debbe2f42fdbe_JaffaCakes118
-
Size
305KB
-
MD5
e895c178b33b244a3e5debbe2f42fdbe
-
SHA1
2a0879e4e0a1fc69355539a3152d429ea9ad046c
-
SHA256
646536c21d67f25b398e37269f50d54ab04082acf880a131c934332106527760
-
SHA512
e01fbaeabd616da8cc81f0bfe083b8b8165868656a2ae1f490f559a5b2209f66fd603299fdbf1b7d8284a29c10c08277b702f95952eeb925d940866828bb1308
-
SSDEEP
6144:jb8Wt7QP7gCO5cOFmRnptuXHejp2J2iPHpc6iOIsaerGQlsFa5dsMcp:jb8WBxCOSRnptO+jp2oScDOdaerGQ8ag
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1