General
-
Target
eab618af96fa8ae6bbb9ffd954a950e6_JaffaCakes118
-
Size
819KB
-
Sample
240919-gm5ehsthmj
-
MD5
eab618af96fa8ae6bbb9ffd954a950e6
-
SHA1
115aca6ea9023f62064918d5c9cb055b064f7b2c
-
SHA256
3d7c4f208462262350362b5114e3adb54a1610a125a3b70c7790974137283e97
-
SHA512
e546324e467845356e1a2504ac7a858d60b0e27e925a905d6f2d47f7f6193b37b14c0d8c63dedaa67b2a987c82f53d0580712806bb27fc6d8ab992d1a0859836
-
SSDEEP
6144:UZfec9EbXDk6Rk8KzGFrQZb++tdsHP4+QfI6UsrG1VVE+Ih/UOPSe570Szp3Znmw:UZWtI6RkderQZb+md4w1U4upOB06Kut
Static task
static1
Behavioral task
behavioral1
Sample
eab618af96fa8ae6bbb9ffd954a950e6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eab618af96fa8ae6bbb9ffd954a950e6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
eab618af96fa8ae6bbb9ffd954a950e6_JaffaCakes118
-
Size
819KB
-
MD5
eab618af96fa8ae6bbb9ffd954a950e6
-
SHA1
115aca6ea9023f62064918d5c9cb055b064f7b2c
-
SHA256
3d7c4f208462262350362b5114e3adb54a1610a125a3b70c7790974137283e97
-
SHA512
e546324e467845356e1a2504ac7a858d60b0e27e925a905d6f2d47f7f6193b37b14c0d8c63dedaa67b2a987c82f53d0580712806bb27fc6d8ab992d1a0859836
-
SSDEEP
6144:UZfec9EbXDk6Rk8KzGFrQZb++tdsHP4+QfI6UsrG1VVE+Ih/UOPSe570Szp3Znmw:UZWtI6RkderQZb+md4w1U4upOB06Kut
-
Modifies visibility of file extensions in Explorer
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
1File Deletion
1Modify Registry
1