General
-
Target
2e66cb16e75f861a31f31dd404c8c5cf_JaffaCakes118
-
Size
991KB
-
Sample
241009-k14a6awfqg
-
MD5
2e66cb16e75f861a31f31dd404c8c5cf
-
SHA1
1e03a48da7f33c250f8a2aa867f101bf513e6ee1
-
SHA256
98d8090944121b40e9b4d17b9d24f3fb5598dfbcd1c56a16440c1407b2f57392
-
SHA512
e101cb6b4cac0bf660decdfc6633de670ca372b9049ceb37e21c7b1c2c6d0c7d8021b0b5a247d22b4e732235330d680047df182ba9d3e8dab709932f9e8d6128
-
SSDEEP
12288:Q0VLFvth+w7GodQpbelTc9skItUkItpzDkjD6I3StlQWHWwjvgx:Q0vv/Nv+kTc9HIsaKHW
Static task
static1
Behavioral task
behavioral1
Sample
2e66cb16e75f861a31f31dd404c8c5cf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e66cb16e75f861a31f31dd404c8c5cf_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
0.5.7B
Aakn1515knAakn1515kn!
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/uqaaCRiU
Targets
-
-
Target
2e66cb16e75f861a31f31dd404c8c5cf_JaffaCakes118
-
Size
991KB
-
MD5
2e66cb16e75f861a31f31dd404c8c5cf
-
SHA1
1e03a48da7f33c250f8a2aa867f101bf513e6ee1
-
SHA256
98d8090944121b40e9b4d17b9d24f3fb5598dfbcd1c56a16440c1407b2f57392
-
SHA512
e101cb6b4cac0bf660decdfc6633de670ca372b9049ceb37e21c7b1c2c6d0c7d8021b0b5a247d22b4e732235330d680047df182ba9d3e8dab709932f9e8d6128
-
SSDEEP
12288:Q0VLFvth+w7GodQpbelTc9skItUkItpzDkjD6I3StlQWHWwjvgx:Q0vv/Nv+kTc9HIsaKHW
Score10/10-
Modifies WinLogon for persistence
-
System Binary Proxy Execution: Regsvcs/Regasm
Abuse Regasm to proxy execution of malicious code.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-