General
-
Target
fac84228fbe70e42bf060aa43238cac5_JaffaCakes118
-
Size
2.2MB
-
Sample
240927-yarfkawajr
-
MD5
fac84228fbe70e42bf060aa43238cac5
-
SHA1
d92a4b9aa6bec7c6227aafe81397feeabb606c90
-
SHA256
25f81be0ca1e9b97867cbf8493e29a96bcd81c42616d1668c8845e1cabb0f9ef
-
SHA512
6c2c4a17f0ba0c0b95561ba0d84ed087716f9b97b1985e15001f6abd1c04c412f3211686adac1a95a115ae1a3c447c23f022b11f62e1e27359dd273d59a9a7a9
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZw:0UzeyQMS4DqodCnoe+iitjWwwU
Behavioral task
behavioral1
Sample
fac84228fbe70e42bf060aa43238cac5_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
fac84228fbe70e42bf060aa43238cac5_JaffaCakes118
-
Size
2.2MB
-
MD5
fac84228fbe70e42bf060aa43238cac5
-
SHA1
d92a4b9aa6bec7c6227aafe81397feeabb606c90
-
SHA256
25f81be0ca1e9b97867cbf8493e29a96bcd81c42616d1668c8845e1cabb0f9ef
-
SHA512
6c2c4a17f0ba0c0b95561ba0d84ed087716f9b97b1985e15001f6abd1c04c412f3211686adac1a95a115ae1a3c447c23f022b11f62e1e27359dd273d59a9a7a9
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZw:0UzeyQMS4DqodCnoe+iitjWwwU
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4