General
-
Target
ec9a4250e2a35f25808dc31c6003d19d_JaffaCakes118
-
Size
357KB
-
Sample
240920-b8tl9asfpe
-
MD5
ec9a4250e2a35f25808dc31c6003d19d
-
SHA1
d518b4dfdc5d9bb05e686fe901e350e9f756c40b
-
SHA256
45c5f96a581e32268e1cca480f9ec2a50d03710a50253f0169b515e74ef6eb26
-
SHA512
88740f34f5249b65399c609bd0ceb398df2a8fad82b8d75fd1cd6e833658b0c83d840ae78554807eddfb30cb639f39c11bb68e7b66782fa6bf329bb97ed8cf20
-
SSDEEP
3072:USHWiNo/ftfQKAc94/3bXZ3Nk6Rk3mQsmEX8TKz3HipjE2Ej5jE2Ej59rtVnmywD:UZfec9EbXDk6Rk8KjE2EBE2Ernmy+g4j
Static task
static1
Behavioral task
behavioral1
Sample
ec9a4250e2a35f25808dc31c6003d19d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec9a4250e2a35f25808dc31c6003d19d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ec9a4250e2a35f25808dc31c6003d19d_JaffaCakes118
-
Size
357KB
-
MD5
ec9a4250e2a35f25808dc31c6003d19d
-
SHA1
d518b4dfdc5d9bb05e686fe901e350e9f756c40b
-
SHA256
45c5f96a581e32268e1cca480f9ec2a50d03710a50253f0169b515e74ef6eb26
-
SHA512
88740f34f5249b65399c609bd0ceb398df2a8fad82b8d75fd1cd6e833658b0c83d840ae78554807eddfb30cb639f39c11bb68e7b66782fa6bf329bb97ed8cf20
-
SSDEEP
3072:USHWiNo/ftfQKAc94/3bXZ3Nk6Rk3mQsmEX8TKz3HipjE2Ej5jE2Ej59rtVnmywD:UZfec9EbXDk6Rk8KjE2EBE2Ernmy+g4j
-
Modifies visibility of file extensions in Explorer
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
1File Deletion
1Modify Registry
1