General
-
Target
f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118
-
Size
896KB
-
Sample
240923-v8x48avejq
-
MD5
f2c9685f78d6905e0c9644e8668e3664
-
SHA1
82c6b3dc28ba5c858b6caa3898094c5952540795
-
SHA256
6d6f9fa7620cf0056d02556ff97c31ce6e6915683c9f12177fc6b506a2dc19c9
-
SHA512
922107924eb0f84f9f07829bfe593e307fb71dc35265b2db25a75e6c7fc88c855e827c84ff20125e04c945c895d10733e6e657e5d60c49597fb1839546e2205e
-
SSDEEP
6144:9KZAoVdw7mzHD9ckgcJdAMBGW60H1obeF9tigMCt:9dw5HRckP0I7lVobAigN
Static task
static1
Behavioral task
behavioral1
Sample
f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
latentbot
bandidos373.zapto.org
Targets
-
-
Target
f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118
-
Size
896KB
-
MD5
f2c9685f78d6905e0c9644e8668e3664
-
SHA1
82c6b3dc28ba5c858b6caa3898094c5952540795
-
SHA256
6d6f9fa7620cf0056d02556ff97c31ce6e6915683c9f12177fc6b506a2dc19c9
-
SHA512
922107924eb0f84f9f07829bfe593e307fb71dc35265b2db25a75e6c7fc88c855e827c84ff20125e04c945c895d10733e6e657e5d60c49597fb1839546e2205e
-
SSDEEP
6144:9KZAoVdw7mzHD9ckgcJdAMBGW60H1obeF9tigMCt:9dw5HRckP0I7lVobAigN
-
Modifies firewall policy service
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
6