General
-
Target
ee5648b51b1c20fc738ec65424f90fc3_JaffaCakes118
-
Size
2.6MB
-
Sample
240920-ywvecawamj
-
MD5
ee5648b51b1c20fc738ec65424f90fc3
-
SHA1
9413dfdd305417bd532d0f9ba412b766b64c9c2d
-
SHA256
40dfb1079a12529a7cf7da67c703f25c92b7c71050a7c434f4d7904ccb0dc5e3
-
SHA512
05b0a53f8434c38375a390d5ac71df32b0724bc9bae1f3424f9f25c51eb5c2eec98871e4a313a918e6c644622280d1ea0256d150d5c387dd00cddd58c54d5129
-
SSDEEP
49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrltKKKKKKKKKKKKKKKKKKKKKKE:86SIROiFJiwp0xlrltKKKKKKKKKKKKKl
Behavioral task
behavioral1
Sample
ee5648b51b1c20fc738ec65424f90fc3_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
ee5648b51b1c20fc738ec65424f90fc3_JaffaCakes118
-
Size
2.6MB
-
MD5
ee5648b51b1c20fc738ec65424f90fc3
-
SHA1
9413dfdd305417bd532d0f9ba412b766b64c9c2d
-
SHA256
40dfb1079a12529a7cf7da67c703f25c92b7c71050a7c434f4d7904ccb0dc5e3
-
SHA512
05b0a53f8434c38375a390d5ac71df32b0724bc9bae1f3424f9f25c51eb5c2eec98871e4a313a918e6c644622280d1ea0256d150d5c387dd00cddd58c54d5129
-
SSDEEP
49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrltKKKKKKKKKKKKKKKKKKKKKKE:86SIROiFJiwp0xlrltKKKKKKKKKKKKKl
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4