General
-
Target
edd162b5229adf2cb1ae6911a30e8bfe_JaffaCakes118
-
Size
762KB
-
Sample
240920-r4aata1hmg
-
MD5
edd162b5229adf2cb1ae6911a30e8bfe
-
SHA1
05afc0e5952bb5d0c841c62ce6a48de9e190b2b4
-
SHA256
e4e47b0b15893279c59463460e29544367028e56f0deec68a7a0b335b6466517
-
SHA512
17cface237dfe52e1c1a3ca796e499ed92d2d603e04f8e47ce4884907dbfd3636927e7db7426a8cb35c602ee9683a69c1f62084df5143439e38d8da471568cfc
-
SSDEEP
6144:GWZfec9EbXDk6RkQKUGFrQZb++tdsHP4+QfI6UXnmy+g4IE2E/nmy+g4H:3ZWtI6Rk6erQZb+md4w1UXa/2
Behavioral task
behavioral1
Sample
edd162b5229adf2cb1ae6911a30e8bfe_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edd162b5229adf2cb1ae6911a30e8bfe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
edd162b5229adf2cb1ae6911a30e8bfe_JaffaCakes118
-
Size
762KB
-
MD5
edd162b5229adf2cb1ae6911a30e8bfe
-
SHA1
05afc0e5952bb5d0c841c62ce6a48de9e190b2b4
-
SHA256
e4e47b0b15893279c59463460e29544367028e56f0deec68a7a0b335b6466517
-
SHA512
17cface237dfe52e1c1a3ca796e499ed92d2d603e04f8e47ce4884907dbfd3636927e7db7426a8cb35c602ee9683a69c1f62084df5143439e38d8da471568cfc
-
SSDEEP
6144:GWZfec9EbXDk6RkQKUGFrQZb++tdsHP4+QfI6UXnmy+g4IE2E/nmy+g4H:3ZWtI6Rk6erQZb+md4w1UXa/2
-
Modifies visibility of file extensions in Explorer
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
1File Deletion
1Modify Registry
1