General
-
Target
ed3ae0057a325f3001da26fb75886b1e_JaffaCakes118
-
Size
484KB
-
Sample
240920-kmqsxayarq
-
MD5
ed3ae0057a325f3001da26fb75886b1e
-
SHA1
f1ce0dd833a9af4e97cd1f1bbbe6358ff1c40660
-
SHA256
b7dd05c858d1ceee2b84c51c01b029855ae08881e89205917ff9b51f916503e8
-
SHA512
19433f8447831f217024402bec52573f249d63553e9b8e3da501204b028e62e978d9b48b5136f40bb8bd32eebe32eae67ebf07c8f8e50ad133cbb52b3f8d6423
-
SSDEEP
12288:WP9GBWQch+L/ZgHP+v7xK0DmFwUfIp7JVyvWt1aBnSFAPHzeO:WPoBHch+uudKNffiv1aVSaPTeO
Static task
static1
Behavioral task
behavioral1
Sample
ed3ae0057a325f3001da26fb75886b1e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed3ae0057a325f3001da26fb75886b1e_JaffaCakes118.exe
Resource
win10v2004-20240910-en
Malware Config
Targets
-
-
Target
ed3ae0057a325f3001da26fb75886b1e_JaffaCakes118
-
Size
484KB
-
MD5
ed3ae0057a325f3001da26fb75886b1e
-
SHA1
f1ce0dd833a9af4e97cd1f1bbbe6358ff1c40660
-
SHA256
b7dd05c858d1ceee2b84c51c01b029855ae08881e89205917ff9b51f916503e8
-
SHA512
19433f8447831f217024402bec52573f249d63553e9b8e3da501204b028e62e978d9b48b5136f40bb8bd32eebe32eae67ebf07c8f8e50ad133cbb52b3f8d6423
-
SSDEEP
12288:WP9GBWQch+L/ZgHP+v7xK0DmFwUfIp7JVyvWt1aBnSFAPHzeO:WPoBHch+uudKNffiv1aVSaPTeO
-
Modifies visiblity of hidden/system files in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2