General
-
Target
5c2f8f3169f6aa13b23cbcac0b2530b3_JaffaCakes118
-
Size
181KB
-
Sample
241019-mhsg2stbnn
-
MD5
5c2f8f3169f6aa13b23cbcac0b2530b3
-
SHA1
bd1b8216d05ea7b9e283f5ed295d054ecddc40f5
-
SHA256
f30fbadea20f8ae93e7db667640fe57be52f068389f11f4399ae9e990d8e065a
-
SHA512
726ab3f5c29235b0b74348deb24314989e15e6523f82602ef9027497888696b583aea8c0474aa567559f57bc62893c1220d4b178d72db9c70e448e6e895388e9
-
SSDEEP
3072:koqC0GPbSSXj58Bijd59KjjfU1YI2JKjrdJhIAbl8KWbDbD8ZXBx0bRZrxSNO:koqCBu24jM1RTV3l8KWbvDSXBabh+
Static task
static1
Behavioral task
behavioral1
Sample
5c2f8f3169f6aa13b23cbcac0b2530b3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5c2f8f3169f6aa13b23cbcac0b2530b3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
5c2f8f3169f6aa13b23cbcac0b2530b3_JaffaCakes118
-
Size
181KB
-
MD5
5c2f8f3169f6aa13b23cbcac0b2530b3
-
SHA1
bd1b8216d05ea7b9e283f5ed295d054ecddc40f5
-
SHA256
f30fbadea20f8ae93e7db667640fe57be52f068389f11f4399ae9e990d8e065a
-
SHA512
726ab3f5c29235b0b74348deb24314989e15e6523f82602ef9027497888696b583aea8c0474aa567559f57bc62893c1220d4b178d72db9c70e448e6e895388e9
-
SSDEEP
3072:koqC0GPbSSXj58Bijd59KjjfU1YI2JKjrdJhIAbl8KWbDbD8ZXBx0bRZrxSNO:koqCBu24jM1RTV3l8KWbvDSXBabh+
-
Detects Andromeda payload.
-
Modifies visibility of file extensions in Explorer
-
Adds policy Run key to start application
-
Deletes itself
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Subvert Trust Controls
1SIP and Trust Provider Hijacking
1