General
-
Target
007c5abf8c081b5c7e287dbd32d50491_JaffaCakes118
-
Size
156KB
-
Sample
240930-kwyvwa1cmg
-
MD5
007c5abf8c081b5c7e287dbd32d50491
-
SHA1
4e134ab5606e1d03edbe19b660cd85f95c49aedb
-
SHA256
e218fbca4e52d1b39cecfcd5f9445af60a9f104dfc4984f1ac6266ba5e06cbe0
-
SHA512
058f6f40d07144ce77e7463bf4de9041d3b5c11cec3cf63aa864a15294e3f734ca2dc0650b13e227c7598a58ee8a2a1f46002f63475a2dd739908b6a05a32494
-
SSDEEP
3072:PBiOiZ78KMuWvKztyo5W6MhYMl1FQ6CfVr8Sl0BdQ1izKA:Plu8K0AtyoYEMLUt0BdQ1id
Static task
static1
Behavioral task
behavioral1
Sample
007c5abf8c081b5c7e287dbd32d50491_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
007c5abf8c081b5c7e287dbd32d50491_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
007c5abf8c081b5c7e287dbd32d50491_JaffaCakes118
-
Size
156KB
-
MD5
007c5abf8c081b5c7e287dbd32d50491
-
SHA1
4e134ab5606e1d03edbe19b660cd85f95c49aedb
-
SHA256
e218fbca4e52d1b39cecfcd5f9445af60a9f104dfc4984f1ac6266ba5e06cbe0
-
SHA512
058f6f40d07144ce77e7463bf4de9041d3b5c11cec3cf63aa864a15294e3f734ca2dc0650b13e227c7598a58ee8a2a1f46002f63475a2dd739908b6a05a32494
-
SSDEEP
3072:PBiOiZ78KMuWvKztyo5W6MhYMl1FQ6CfVr8Sl0BdQ1izKA:Plu8K0AtyoYEMLUt0BdQ1id
Score10/10-
Modifies visiblity of hidden/system files in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2