General
-
Target
16b485d0bc1c593731cdf67189356fe5_JaffaCakes118
-
Size
222KB
-
Sample
241005-h6hwasserr
-
MD5
16b485d0bc1c593731cdf67189356fe5
-
SHA1
6c7d62cbad2fb47afbdc713188f0567fc407ddd2
-
SHA256
88c1f8fe57fcf433da6d2855d13057d390066ad8469b878647842e637242427a
-
SHA512
0c1a2486f1fc66b7dd3a44bdec2410af875cae7d21a17119695e196a261d25b5d93244d2885fab5070afe3e2c08d28063c64794bba0fd4b5081677949839964e
-
SSDEEP
3072:Ydu0nEjbUQCN/bS0JPcTsCSI9EvMs/Oap4/kT4X9EiYo4X7M0B3mbVRfcE:QtydKPC3ScEvJ48stX4XXYbDfP
Static task
static1
Behavioral task
behavioral1
Sample
16b485d0bc1c593731cdf67189356fe5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
16b485d0bc1c593731cdf67189356fe5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
16b485d0bc1c593731cdf67189356fe5_JaffaCakes118
-
Size
222KB
-
MD5
16b485d0bc1c593731cdf67189356fe5
-
SHA1
6c7d62cbad2fb47afbdc713188f0567fc407ddd2
-
SHA256
88c1f8fe57fcf433da6d2855d13057d390066ad8469b878647842e637242427a
-
SHA512
0c1a2486f1fc66b7dd3a44bdec2410af875cae7d21a17119695e196a261d25b5d93244d2885fab5070afe3e2c08d28063c64794bba0fd4b5081677949839964e
-
SSDEEP
3072:Ydu0nEjbUQCN/bS0JPcTsCSI9EvMs/Oap4/kT4X9EiYo4X7M0B3mbVRfcE:QtydKPC3ScEvJ48stX4XXYbDfP
Score10/10-
Modifies firewall policy service
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Subvert Trust Controls
1SIP and Trust Provider Hijacking
1