General
-
Target
ecb5e24a053747cced62d09c7b06b0e2_JaffaCakes118
-
Size
855KB
-
Sample
240920-dfwx1swbjj
-
MD5
ecb5e24a053747cced62d09c7b06b0e2
-
SHA1
8b7f0c0cad53a42196f835b8e7c0aaaaf9431987
-
SHA256
fcc508831a2b09745f434e31763e1fcda6cf16b19e428e143c9b8e9cd7e3868b
-
SHA512
3a821cbac93d2bf29d726b9efe5480b9730b6176b955bc8a812265108e7a7be132b29b5a876bb3b14b8f910cc4c2feb4287ccba5422eff223ed63b68bff2d4a5
-
SSDEEP
6144:UZfec9EbXDk6RkAZKWnmy+g4IE2EorG1VVE+Ih/UOPSe570Szp3/uHOWnmy+g4Ij:UZWtI6RkqakupOB0fOWakupOB03OB0E
Static task
static1
Behavioral task
behavioral1
Sample
ecb5e24a053747cced62d09c7b06b0e2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecb5e24a053747cced62d09c7b06b0e2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ecb5e24a053747cced62d09c7b06b0e2_JaffaCakes118
-
Size
855KB
-
MD5
ecb5e24a053747cced62d09c7b06b0e2
-
SHA1
8b7f0c0cad53a42196f835b8e7c0aaaaf9431987
-
SHA256
fcc508831a2b09745f434e31763e1fcda6cf16b19e428e143c9b8e9cd7e3868b
-
SHA512
3a821cbac93d2bf29d726b9efe5480b9730b6176b955bc8a812265108e7a7be132b29b5a876bb3b14b8f910cc4c2feb4287ccba5422eff223ed63b68bff2d4a5
-
SSDEEP
6144:UZfec9EbXDk6RkAZKWnmy+g4IE2EorG1VVE+Ih/UOPSe570Szp3/uHOWnmy+g4Ij:UZWtI6RkqakupOB0fOWakupOB03OB0E
-
Modifies visibility of file extensions in Explorer
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
1File Deletion
1Modify Registry
1