General
-
Target
ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118
-
Size
548KB
-
Sample
240929-yp2vva1hja
-
MD5
ff3b7f563de4bd79698ca6e2ee3ca06a
-
SHA1
06e5eb41bec31f468229ea93a54976dc76eb4ad9
-
SHA256
ffb320ec60c0a19ad1a4a3dddd22075c6e66a94cbef4c321a6d09f5f3a36ae55
-
SHA512
29e2ec9acb0e011ed297b6bdeb1304ebd70593ec85b7b63ea89552ac05ed7f791797e79db7eb400cd4e08064e668ccfc2233bf6981ba0945ed16e83fd0a62a11
-
SSDEEP
12288:DuqrBDT27EdMxsygLDeFCv+WNCR0oX5M/k1:DxrVBd4lZjXB1
Behavioral task
behavioral1
Sample
ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
cybergate
2.6
Server
asmida.zapto.org:81
asmida2.zapto.org:81
asmida.zapto.org:444
asmida2.zapto.org:444
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Microsoft
-
install_file
Microsoft.NET.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
Targets
-
-
Target
ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118
-
Size
548KB
-
MD5
ff3b7f563de4bd79698ca6e2ee3ca06a
-
SHA1
06e5eb41bec31f468229ea93a54976dc76eb4ad9
-
SHA256
ffb320ec60c0a19ad1a4a3dddd22075c6e66a94cbef4c321a6d09f5f3a36ae55
-
SHA512
29e2ec9acb0e011ed297b6bdeb1304ebd70593ec85b7b63ea89552ac05ed7f791797e79db7eb400cd4e08064e668ccfc2233bf6981ba0945ed16e83fd0a62a11
-
SSDEEP
12288:DuqrBDT27EdMxsygLDeFCv+WNCR0oX5M/k1:DxrVBd4lZjXB1
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2