General
-
Target
e9afb92440bce81c786dab2d6ff7d163_JaffaCakes118
-
Size
2.2MB
-
Sample
240918-wnnkqavelc
-
MD5
e9afb92440bce81c786dab2d6ff7d163
-
SHA1
c12ad19629e2bfb463ff97c8a66286f2250c41a5
-
SHA256
281c93200988094042df096fe6bd1e094265eac8650b303a93a6bdc7d51aff4e
-
SHA512
199d9aa1b6baa2986d5ad5b9d200ebd77e0a57a1b59ee3e38c789b95904772b4bd5e8dfa4404e689160bdd11f3eea55447a3c73f11eaa0af4e1a43240d28a960
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZw:0UzeyQMS4DqodCnoe+iitjWwwc
Behavioral task
behavioral1
Sample
e9afb92440bce81c786dab2d6ff7d163_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
e9afb92440bce81c786dab2d6ff7d163_JaffaCakes118
-
Size
2.2MB
-
MD5
e9afb92440bce81c786dab2d6ff7d163
-
SHA1
c12ad19629e2bfb463ff97c8a66286f2250c41a5
-
SHA256
281c93200988094042df096fe6bd1e094265eac8650b303a93a6bdc7d51aff4e
-
SHA512
199d9aa1b6baa2986d5ad5b9d200ebd77e0a57a1b59ee3e38c789b95904772b4bd5e8dfa4404e689160bdd11f3eea55447a3c73f11eaa0af4e1a43240d28a960
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZw:0UzeyQMS4DqodCnoe+iitjWwwc
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4