General
-
Target
f29cebec13239b10170d4ab18f500a9f_JaffaCakes118
-
Size
141KB
-
Sample
240923-tel97avelc
-
MD5
f29cebec13239b10170d4ab18f500a9f
-
SHA1
4a85345921f537c8852c37e39b5d409122b34ce8
-
SHA256
97f9d64f13c13f657e1a6ee124b5addb02bbf8e4c60746c29ca7ce80c617deb2
-
SHA512
0018f27d80949be0c2d32857012b3ff8c73da774a089c5041758c97cbcfca0d616e776d28103794a0d860834767084a1f16096e3d55af678f15bfa168a480ec8
-
SSDEEP
3072:6jaeY9QFVyoALuV2xnHNi+ofCSn8w4m1qjJK+nJ8/mpczn94bSL5Jfu6:jQ4A2HoDV4VjJNnJ8/cK4OL5Jfu6
Static task
static1
Behavioral task
behavioral1
Sample
f29cebec13239b10170d4ab18f500a9f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f29cebec13239b10170d4ab18f500a9f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
latentbot
bluelightning.zapto.org
Targets
-
-
Target
f29cebec13239b10170d4ab18f500a9f_JaffaCakes118
-
Size
141KB
-
MD5
f29cebec13239b10170d4ab18f500a9f
-
SHA1
4a85345921f537c8852c37e39b5d409122b34ce8
-
SHA256
97f9d64f13c13f657e1a6ee124b5addb02bbf8e4c60746c29ca7ce80c617deb2
-
SHA512
0018f27d80949be0c2d32857012b3ff8c73da774a089c5041758c97cbcfca0d616e776d28103794a0d860834767084a1f16096e3d55af678f15bfa168a480ec8
-
SSDEEP
3072:6jaeY9QFVyoALuV2xnHNi+ofCSn8w4m1qjJK+nJ8/mpczn94bSL5Jfu6:jQ4A2HoDV4VjJNnJ8/cK4OL5Jfu6
Score10/10-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-