General
-
Target
ed570d2c1d94014484f8cdb799bb35d8_JaffaCakes118
-
Size
309KB
-
Sample
240920-lwrx1azgrh
-
MD5
ed570d2c1d94014484f8cdb799bb35d8
-
SHA1
a5042e1d6553b473b46e664f8ec9b25837434727
-
SHA256
a78c238b16524d721ccd95e7c4d5ed60ad8ab105c4dac7c9c764119e57191d30
-
SHA512
7644e39176b0a68f3b0c3788cf328ab5a76a8948318204928afb57a6666b3c73899f29ecb8c14ab6b793bd8fb4de4149e34331bac279bb8ec99f4ed30e1fadb7
-
SSDEEP
6144:3KRVn+4v3O2W8GMJrAzMlBNHFnq4wwILzmUkHVgxb6dq8/BxjH0:O+4PO23nAzmamUkHVg96k6xj
Static task
static1
Behavioral task
behavioral1
Sample
ed570d2c1d94014484f8cdb799bb35d8_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
latentbot
wiinergoessick.zapto.org
1wiinergoessick.zapto.org
2wiinergoessick.zapto.org
3wiinergoessick.zapto.org
4wiinergoessick.zapto.org
5wiinergoessick.zapto.org
6wiinergoessick.zapto.org
7wiinergoessick.zapto.org
8wiinergoessick.zapto.org
Targets
-
-
Target
ed570d2c1d94014484f8cdb799bb35d8_JaffaCakes118
-
Size
309KB
-
MD5
ed570d2c1d94014484f8cdb799bb35d8
-
SHA1
a5042e1d6553b473b46e664f8ec9b25837434727
-
SHA256
a78c238b16524d721ccd95e7c4d5ed60ad8ab105c4dac7c9c764119e57191d30
-
SHA512
7644e39176b0a68f3b0c3788cf328ab5a76a8948318204928afb57a6666b3c73899f29ecb8c14ab6b793bd8fb4de4149e34331bac279bb8ec99f4ed30e1fadb7
-
SSDEEP
6144:3KRVn+4v3O2W8GMJrAzMlBNHFnq4wwILzmUkHVgxb6dq8/BxjH0:O+4PO23nAzmamUkHVg96k6xj
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1