General
-
Target
ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118
-
Size
147KB
-
Sample
240920-xjktpsscja
-
MD5
ee38e40d13cfee4d0fb24624c152fb48
-
SHA1
55d903926d63c0a2db44774d15b137af2b4483be
-
SHA256
242fd2d6c72a0a3cfe8f767465e30d94d70e2d094277ad3d6be99336af625480
-
SHA512
8b8d85f2335b2d3b247226583a4f7a717b65cb740c4fbe9fce093b15b23c43da1d1271943d8c48bf567cea806735f91e89928b8cd9f5abbf6d84626e83fbe8f1
-
SSDEEP
3072:5jFRQGCIIm1xs5GWp1icKAArDZz4N9GhbkrNEk1AgZ:dQGCIImOp0yN90QEE
Static task
static1
Behavioral task
behavioral1
Sample
ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118.exe
Resource
win10v2004-20240910-en
Malware Config
Extracted
https://bitbucket.org/dazlle/logos/downloads/svchost.exe
Extracted
https://bitbucket.org/dazlle/logos/downloads/TASK.ps1
Targets
-
-
Target
ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118
-
Size
147KB
-
MD5
ee38e40d13cfee4d0fb24624c152fb48
-
SHA1
55d903926d63c0a2db44774d15b137af2b4483be
-
SHA256
242fd2d6c72a0a3cfe8f767465e30d94d70e2d094277ad3d6be99336af625480
-
SHA512
8b8d85f2335b2d3b247226583a4f7a717b65cb740c4fbe9fce093b15b23c43da1d1271943d8c48bf567cea806735f91e89928b8cd9f5abbf6d84626e83fbe8f1
-
SSDEEP
3072:5jFRQGCIIm1xs5GWp1icKAArDZz4N9GhbkrNEk1AgZ:dQGCIImOp0yN90QEE
Score10/10-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-