General
-
Target
ee863dc8736dd93e2f9caae2b997d3fe_JaffaCakes118
-
Size
1.1MB
-
Sample
240920-14dsns1drq
-
MD5
ee863dc8736dd93e2f9caae2b997d3fe
-
SHA1
05e002b27e64a8c895051c84b791151b7febb0b0
-
SHA256
98f4f94d0bfff8bceb85c9bbc537b32c33e54036290ef77966dc5f9003f83631
-
SHA512
5c8778fb4f363a4da6bef37917ea3c76c4d8f2574fa214f3b4df38d30a1a912765ab6871ae65a2119506b050619f86f97bc8e498adc76e178668ff6f3e8c1f23
-
SSDEEP
768:uD9Wd1N5DLAwnVWEAaUIgKZhdTTgZrBC6v5WU8XOWI:ua1N53XEE3UIgMhdT0Ztf5/8+WI
Static task
static1
Behavioral task
behavioral1
Sample
ee863dc8736dd93e2f9caae2b997d3fe_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ee863dc8736dd93e2f9caae2b997d3fe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ee863dc8736dd93e2f9caae2b997d3fe_JaffaCakes118
-
Size
1.1MB
-
MD5
ee863dc8736dd93e2f9caae2b997d3fe
-
SHA1
05e002b27e64a8c895051c84b791151b7febb0b0
-
SHA256
98f4f94d0bfff8bceb85c9bbc537b32c33e54036290ef77966dc5f9003f83631
-
SHA512
5c8778fb4f363a4da6bef37917ea3c76c4d8f2574fa214f3b4df38d30a1a912765ab6871ae65a2119506b050619f86f97bc8e498adc76e178668ff6f3e8c1f23
-
SSDEEP
768:uD9Wd1N5DLAwnVWEAaUIgKZhdTTgZrBC6v5WU8XOWI:ua1N53XEE3UIgMhdT0Ztf5/8+WI
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
5