General
-
Target
ea93ba24f984cd43c9dd3991b6b17de4_JaffaCakes118
-
Size
2.2MB
-
Sample
240919-ez6r1a1ble
-
MD5
ea93ba24f984cd43c9dd3991b6b17de4
-
SHA1
b4c6eb9a2a50dc2afe64a6b1504caabb97ca0457
-
SHA256
2d0bb2ce23fd84795444003d84a0d601d3d769f873e136af99ce8c4e3c7a27ea
-
SHA512
7b3f56e2b49e18a13e48cc8c521e8d7fe4d77e4cd12e40b850356b585275699ea9f02fd64bcaed4cad55a134c102ca81428d778bcf23bb14ccc7ceaf3fe86a65
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZg:0UzeyQMS4DqodCnoe+iitjWwwk
Behavioral task
behavioral1
Sample
ea93ba24f984cd43c9dd3991b6b17de4_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
ea93ba24f984cd43c9dd3991b6b17de4_JaffaCakes118
-
Size
2.2MB
-
MD5
ea93ba24f984cd43c9dd3991b6b17de4
-
SHA1
b4c6eb9a2a50dc2afe64a6b1504caabb97ca0457
-
SHA256
2d0bb2ce23fd84795444003d84a0d601d3d769f873e136af99ce8c4e3c7a27ea
-
SHA512
7b3f56e2b49e18a13e48cc8c521e8d7fe4d77e4cd12e40b850356b585275699ea9f02fd64bcaed4cad55a134c102ca81428d778bcf23bb14ccc7ceaf3fe86a65
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZg:0UzeyQMS4DqodCnoe+iitjWwwk
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4