General
-
Target
ed8773c6691daf548827a0e955579303_JaffaCakes118
-
Size
613KB
-
Sample
240920-n33zysvgqq
-
MD5
ed8773c6691daf548827a0e955579303
-
SHA1
717c70bbb7ef42bd60418605607aa0da2d964433
-
SHA256
fb38d8cc4c5a18b4de26eae1d3f83f1db89051406f3eb5cbf28eef90b78a8fe8
-
SHA512
ced1e361c4a4e9afd8204759843c8f0d0302b248da3e51452bbfe7cf02fb937ec25d63a8bea51a62820bdf06727a6e114fffea2902ca962952194c9b48f03567
-
SSDEEP
12288:UZWtI6RkeeZJys73dOvXDpNjNe8NeZJys73dOvXDpNjNe8mjlXD:UuhaeeZJ8NI8NeZJ8NI8QT
Static task
static1
Behavioral task
behavioral1
Sample
ed8773c6691daf548827a0e955579303_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ed8773c6691daf548827a0e955579303_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ed8773c6691daf548827a0e955579303_JaffaCakes118
-
Size
613KB
-
MD5
ed8773c6691daf548827a0e955579303
-
SHA1
717c70bbb7ef42bd60418605607aa0da2d964433
-
SHA256
fb38d8cc4c5a18b4de26eae1d3f83f1db89051406f3eb5cbf28eef90b78a8fe8
-
SHA512
ced1e361c4a4e9afd8204759843c8f0d0302b248da3e51452bbfe7cf02fb937ec25d63a8bea51a62820bdf06727a6e114fffea2902ca962952194c9b48f03567
-
SSDEEP
12288:UZWtI6RkeeZJys73dOvXDpNjNe8NeZJys73dOvXDpNjNe8mjlXD:UuhaeeZJ8NI8NeZJ8NI8QT
-
Modifies visibility of file extensions in Explorer
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
1File Deletion
1Modify Registry
1