General
-
Target
00ed479a140d88f91796423f840fea8a_JaffaCakes118
-
Size
279KB
-
Sample
240930-mvz3na1bqn
-
MD5
00ed479a140d88f91796423f840fea8a
-
SHA1
52a0675dba09ea9d8d0c4d1647ac7b201941df37
-
SHA256
5ca81371c33e6302693fa24496d796188eb5bfa45e0901c3d6b9841c400a4d3b
-
SHA512
dcf2e28f0895ab0f9970d88c5a168463af4edc700bafa860703d1794ab773e7e86ccf395b825990eb5b60d1c64dd0cc57f3f87606bdb5ee3b776e15e9a4be913
-
SSDEEP
6144:Bt3Bt/i7mD9EtBzdedpKRgqjaCq8GdZuvDyIKiL:y7mZEtJ2KiqOCvlrr
Static task
static1
Behavioral task
behavioral1
Sample
00ed479a140d88f91796423f840fea8a_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
latentbot
atualizador.zapto.org
Targets
-
-
Target
00ed479a140d88f91796423f840fea8a_JaffaCakes118
-
Size
279KB
-
MD5
00ed479a140d88f91796423f840fea8a
-
SHA1
52a0675dba09ea9d8d0c4d1647ac7b201941df37
-
SHA256
5ca81371c33e6302693fa24496d796188eb5bfa45e0901c3d6b9841c400a4d3b
-
SHA512
dcf2e28f0895ab0f9970d88c5a168463af4edc700bafa860703d1794ab773e7e86ccf395b825990eb5b60d1c64dd0cc57f3f87606bdb5ee3b776e15e9a4be913
-
SSDEEP
6144:Bt3Bt/i7mD9EtBzdedpKRgqjaCq8GdZuvDyIKiL:y7mZEtJ2KiqOCvlrr
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
6