General
-
Target
fff8da65f5e9cd7caa1708fdd8c3e82f_JaffaCakes118
-
Size
280KB
-
Sample
240930-e6cshaybpl
-
MD5
fff8da65f5e9cd7caa1708fdd8c3e82f
-
SHA1
51f414d2ceb40c087b9ab3a06a820278523f718f
-
SHA256
864dbc9fd3d94f589cf34d7c8d5b5b5c330b678575d422451bca49f265a098fd
-
SHA512
ebbfc7b519d340130b629e1ac338d3976be18992cf36b88f47312f0a21a313cc9a965febc36a962d1845f0e0b9eeedf143cfa330ce6eec90ad6aa785eda10b4b
-
SSDEEP
6144:FHvijHiEwlU+3QEHUpDpEK18gYx11v7cS9gqvW/f9+of:FPXEOU+fUpyKag49g6sf9+
Static task
static1
Behavioral task
behavioral1
Sample
fff8da65f5e9cd7caa1708fdd8c3e82f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fff8da65f5e9cd7caa1708fdd8c3e82f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
fff8da65f5e9cd7caa1708fdd8c3e82f_JaffaCakes118
-
Size
280KB
-
MD5
fff8da65f5e9cd7caa1708fdd8c3e82f
-
SHA1
51f414d2ceb40c087b9ab3a06a820278523f718f
-
SHA256
864dbc9fd3d94f589cf34d7c8d5b5b5c330b678575d422451bca49f265a098fd
-
SHA512
ebbfc7b519d340130b629e1ac338d3976be18992cf36b88f47312f0a21a313cc9a965febc36a962d1845f0e0b9eeedf143cfa330ce6eec90ad6aa785eda10b4b
-
SSDEEP
6144:FHvijHiEwlU+3QEHUpDpEK18gYx11v7cS9gqvW/f9+of:FPXEOU+fUpyKag49g6sf9+
-
Modifies security service
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3