General
-
Target
ed3b0943b223fcad9d78973af5410fa3_JaffaCakes118
-
Size
29KB
-
Sample
240920-kmvf4axgkg
-
MD5
ed3b0943b223fcad9d78973af5410fa3
-
SHA1
6d78285c8092121ecd65195c03aee430bad8013a
-
SHA256
b15d63681c17e2aad8ae6d656c451ed51d4116345513c288b0127fbdebc60f02
-
SHA512
1d296539f4d6568dbbde8e3cdc08e0221860cb02e199e081b81b0ee1624eab6c7e208ce939c2ff827a79881f6bf12d2d2eb3384372ecd1e2123e376711838672
-
SSDEEP
192:w4NslLZEvA+6/6r8px8SmvowzxM4LFs3ur9VYCD2hfuEus7a40j0pkB1t2la8:w98iS8px8SMDMtuvh6mKa40j0p4ty
Behavioral task
behavioral1
Sample
ed3b0943b223fcad9d78973af5410fa3_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed3b0943b223fcad9d78973af5410fa3_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ed3b0943b223fcad9d78973af5410fa3_JaffaCakes118
-
Size
29KB
-
MD5
ed3b0943b223fcad9d78973af5410fa3
-
SHA1
6d78285c8092121ecd65195c03aee430bad8013a
-
SHA256
b15d63681c17e2aad8ae6d656c451ed51d4116345513c288b0127fbdebc60f02
-
SHA512
1d296539f4d6568dbbde8e3cdc08e0221860cb02e199e081b81b0ee1624eab6c7e208ce939c2ff827a79881f6bf12d2d2eb3384372ecd1e2123e376711838672
-
SSDEEP
192:w4NslLZEvA+6/6r8px8SmvowzxM4LFs3ur9VYCD2hfuEus7a40j0pkB1t2la8:w98iS8px8SMDMtuvh6mKa40j0p4ty
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3