General
-
Target
fc7ed11225707bb03a06a6e3b6b06f04_JaffaCakes118
-
Size
31KB
-
Sample
240928-rvda4staqc
-
MD5
fc7ed11225707bb03a06a6e3b6b06f04
-
SHA1
ecda25ee858992a96c1d01e65ab359ef33da8c9b
-
SHA256
434c3b5ab0a2b53e04e4cdf6df69ab626919e3f5b9cffde95e178fe975d463b4
-
SHA512
02a33c11e26614320a707bc5f8ec89cfad3e23aef596759071ebc7b76702602eb56717f4d3be7711370cc8b749a7be28bdadd7299957b614ecf5ed47d6ab8c82
-
SSDEEP
768:m7h0/b13hdwzxLy3mMzS/LYVvshQmIDUu0ti7Usj:44Z6wYyQQVkaj
Behavioral task
behavioral1
Sample
fc7ed11225707bb03a06a6e3b6b06f04_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc7ed11225707bb03a06a6e3b6b06f04_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
Zombie
tmvlflt.p-e.kr:1
bd9defde5bca6ae254f0613ef4c03b4a
-
reg_key
bd9defde5bca6ae254f0613ef4c03b4a
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
fc7ed11225707bb03a06a6e3b6b06f04_JaffaCakes118
-
Size
31KB
-
MD5
fc7ed11225707bb03a06a6e3b6b06f04
-
SHA1
ecda25ee858992a96c1d01e65ab359ef33da8c9b
-
SHA256
434c3b5ab0a2b53e04e4cdf6df69ab626919e3f5b9cffde95e178fe975d463b4
-
SHA512
02a33c11e26614320a707bc5f8ec89cfad3e23aef596759071ebc7b76702602eb56717f4d3be7711370cc8b749a7be28bdadd7299957b614ecf5ed47d6ab8c82
-
SSDEEP
768:m7h0/b13hdwzxLy3mMzS/LYVvshQmIDUu0ti7Usj:44Z6wYyQQVkaj
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1