General
-
Target
f967a2804930393bc3234957bb0d99c3_JaffaCakes118
-
Size
2.2MB
-
Sample
240927-axjr8swdkn
-
MD5
f967a2804930393bc3234957bb0d99c3
-
SHA1
6862a6b2cac87e146888901cad620d56381f115f
-
SHA256
d47277350e6e5c15f013c2af98ae8a51fea1ebd02acb9db40417e43c017066c6
-
SHA512
9b8c5584c5a29b003ec877efea00e18f38e95bc27e462d33007ba2eb85663ed3dbd22ec412edadad2d28d7af8a757f2f11d2572fe1d3df893fec6224933c1bda
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZj:0UzeyQMS4DqodCnoe+iitjWwwf
Behavioral task
behavioral1
Sample
f967a2804930393bc3234957bb0d99c3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
f967a2804930393bc3234957bb0d99c3_JaffaCakes118
-
Size
2.2MB
-
MD5
f967a2804930393bc3234957bb0d99c3
-
SHA1
6862a6b2cac87e146888901cad620d56381f115f
-
SHA256
d47277350e6e5c15f013c2af98ae8a51fea1ebd02acb9db40417e43c017066c6
-
SHA512
9b8c5584c5a29b003ec877efea00e18f38e95bc27e462d33007ba2eb85663ed3dbd22ec412edadad2d28d7af8a757f2f11d2572fe1d3df893fec6224933c1bda
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZj:0UzeyQMS4DqodCnoe+iitjWwwf
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Safe Mode Boot
1Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1