General
-
Target
eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118
-
Size
2.2MB
-
Sample
240919-fxdh4ssgjn
-
MD5
eaa6966575d28fa84ddcf3ba17c4d07e
-
SHA1
f5f44be0cb637bea6348e506ee94136bb41bfa8f
-
SHA256
16fed893171b69ceb22b85992f486ff2fd45d26de273deced2fb46b2517d755f
-
SHA512
57769e221cf3127284ded0c043d977168a7d5395abc2d095cbbd7564f0e5bae5574100e1364df2116e29db4244eea87d344041983c2a62328f3a12f24f72060d
-
SSDEEP
49152:mDwQZshctg3xglTVGI8HoBfAIPYiiqowvq00p7PiKXT0phLdlh:mDwQEuUxglcI8HoiIrwzXopZdL
Static task
static1
Behavioral task
behavioral1
Sample
eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://softscoreinc.com/soft-usage/favicon.ico?0=1200&1=UPNECVIU&2=i-s&3=17&4=7601&5=6&6=1&7=99600&8=1033
Extracted
http://softscoreinc.com/soft-usage/favicon.ico?0=1200&1=ZEUYFSYD&2=i-s&3=17&4=9200&5=6&6=2&7=919041&8=1033
Targets
-
-
Target
eaa6966575d28fa84ddcf3ba17c4d07e_JaffaCakes118
-
Size
2.2MB
-
MD5
eaa6966575d28fa84ddcf3ba17c4d07e
-
SHA1
f5f44be0cb637bea6348e506ee94136bb41bfa8f
-
SHA256
16fed893171b69ceb22b85992f486ff2fd45d26de273deced2fb46b2517d755f
-
SHA512
57769e221cf3127284ded0c043d977168a7d5395abc2d095cbbd7564f0e5bae5574100e1364df2116e29db4244eea87d344041983c2a62328f3a12f24f72060d
-
SSDEEP
49152:mDwQZshctg3xglTVGI8HoBfAIPYiiqowvq00p7PiKXT0phLdlh:mDwQEuUxglcI8HoiIrwzXopZdL
-
Modifies WinLogon for persistence
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
4