General
-
Target
f7ee75ccce430785a95aae9e7f2d01ca_JaffaCakes118
-
Size
2.2MB
-
Sample
240926-jzbn3swdqk
-
MD5
f7ee75ccce430785a95aae9e7f2d01ca
-
SHA1
9aa6dee0fd7b163ba4c1c3e9f0a4ab5957f9573e
-
SHA256
663f39b6dfbf1ef080e9984e3ca792bba651ca9859c54f8b5c7689414c9dc70f
-
SHA512
61a568ff8bc8137df91871f66b1799be77a34ed449d0e20ef335fb8b821c94388a1de4cdf04957f8391c5a73836afb2e93d45278645bfdb3c293c65586cdf8ee
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ8:0UzeyQMS4DqodCnoe+iitjWwwg
Behavioral task
behavioral1
Sample
f7ee75ccce430785a95aae9e7f2d01ca_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
f7ee75ccce430785a95aae9e7f2d01ca_JaffaCakes118
-
Size
2.2MB
-
MD5
f7ee75ccce430785a95aae9e7f2d01ca
-
SHA1
9aa6dee0fd7b163ba4c1c3e9f0a4ab5957f9573e
-
SHA256
663f39b6dfbf1ef080e9984e3ca792bba651ca9859c54f8b5c7689414c9dc70f
-
SHA512
61a568ff8bc8137df91871f66b1799be77a34ed449d0e20ef335fb8b821c94388a1de4cdf04957f8391c5a73836afb2e93d45278645bfdb3c293c65586cdf8ee
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ8:0UzeyQMS4DqodCnoe+iitjWwwg
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4