General
-
Target
3e5d7f3e28b6066d3f2d51c729f1d61e_JaffaCakes118
-
Size
552KB
-
Sample
241013-hgb2fsxhmm
-
MD5
3e5d7f3e28b6066d3f2d51c729f1d61e
-
SHA1
51828ce3cac6729e006e354b15111771c2fb1c54
-
SHA256
b213c6324fa3d030e27f1cee343fb4604b62369984d5f68391e1fe87650f75cf
-
SHA512
03ded325752d9e5cbeb28b38494c9fe168a6c1f9a2e3092072f26e0e42660443cb66ef1623316c5d48de2dae8e0b48172a163f4c60fd738098aeb7af1a4cc6a9
-
SSDEEP
12288:N3RFfYqebVjqGQwkDS17rGNrkty0fkhAlmv:N3RFY/jqVw1ErmyFAe
Static task
static1
Behavioral task
behavioral1
Sample
3e5d7f3e28b6066d3f2d51c729f1d61e_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
latentbot
gniewkowiec0359.zapto.org
Targets
-
-
Target
3e5d7f3e28b6066d3f2d51c729f1d61e_JaffaCakes118
-
Size
552KB
-
MD5
3e5d7f3e28b6066d3f2d51c729f1d61e
-
SHA1
51828ce3cac6729e006e354b15111771c2fb1c54
-
SHA256
b213c6324fa3d030e27f1cee343fb4604b62369984d5f68391e1fe87650f75cf
-
SHA512
03ded325752d9e5cbeb28b38494c9fe168a6c1f9a2e3092072f26e0e42660443cb66ef1623316c5d48de2dae8e0b48172a163f4c60fd738098aeb7af1a4cc6a9
-
SSDEEP
12288:N3RFfYqebVjqGQwkDS17rGNrkty0fkhAlmv:N3RFY/jqVw1ErmyFAe
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1