General
-
Target
fb4b3b5c70a88eff5b4b60dbd3f30bcb_JaffaCakes118
-
Size
1.2MB
-
Sample
240928-chrkmstena
-
MD5
fb4b3b5c70a88eff5b4b60dbd3f30bcb
-
SHA1
963a4e35e3320734c19f032365447c66177a7205
-
SHA256
938a2360fc46d97cbb6d900ef3dea1603b1f3be667634cafaffa066b016f35d1
-
SHA512
9f0fe7b6db3bed5dfada9899441dc411f1ea26920ba9f5a22192fca34e54164992ddbebc79c84cd0df4764149638da6233c85e244a29e6caedb3dc5efa45b1fb
-
SSDEEP
12288:3ZWtI6RkguPuMjyfHSEG/BKMi40ce8YPX+VcaMVkUet7EwBI+APuO8:3uhanyfHSt5ZUcSPuOzVkUetVI5uO8
Behavioral task
behavioral1
Sample
fb4b3b5c70a88eff5b4b60dbd3f30bcb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fb4b3b5c70a88eff5b4b60dbd3f30bcb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
fb4b3b5c70a88eff5b4b60dbd3f30bcb_JaffaCakes118
-
Size
1.2MB
-
MD5
fb4b3b5c70a88eff5b4b60dbd3f30bcb
-
SHA1
963a4e35e3320734c19f032365447c66177a7205
-
SHA256
938a2360fc46d97cbb6d900ef3dea1603b1f3be667634cafaffa066b016f35d1
-
SHA512
9f0fe7b6db3bed5dfada9899441dc411f1ea26920ba9f5a22192fca34e54164992ddbebc79c84cd0df4764149638da6233c85e244a29e6caedb3dc5efa45b1fb
-
SSDEEP
12288:3ZWtI6RkguPuMjyfHSEG/BKMi40ce8YPX+VcaMVkUet7EwBI+APuO8:3uhanyfHSt5ZUcSPuOzVkUetVI5uO8
-
Modifies visibility of file extensions in Explorer
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
1File Deletion
1Modify Registry
1