General
-
Target
615736b3586f6574550ba5975fb7e586_JaffaCakes118
-
Size
1.5MB
-
Sample
241020-knvs9a1dpm
-
MD5
615736b3586f6574550ba5975fb7e586
-
SHA1
5daf2a0ec3a975ce4fc76a9403886cce0eb6a8d3
-
SHA256
4a87788a7028f3261ef6a5fef0072290cd3722cfc8bba27fc5cf2df97378e3f6
-
SHA512
0df87beddbd1a42f93f15df198a7778fb85c4437939d311270c61017540a0aa91bc8066d90338c71f948af1de0c15b84e8733e977ff2ed6c939abc60f3731290
-
SSDEEP
49152:81vqjd/QIgW2b4VTPA3Op4DzIwNHVj+GfWWF:81vqjhgW2bqbhmjN1Vp
Static task
static1
Behavioral task
behavioral1
Sample
615736b3586f6574550ba5975fb7e586_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
615736b3586f6574550ba5975fb7e586_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
615736b3586f6574550ba5975fb7e586_JaffaCakes118
-
Size
1.5MB
-
MD5
615736b3586f6574550ba5975fb7e586
-
SHA1
5daf2a0ec3a975ce4fc76a9403886cce0eb6a8d3
-
SHA256
4a87788a7028f3261ef6a5fef0072290cd3722cfc8bba27fc5cf2df97378e3f6
-
SHA512
0df87beddbd1a42f93f15df198a7778fb85c4437939d311270c61017540a0aa91bc8066d90338c71f948af1de0c15b84e8733e977ff2ed6c939abc60f3731290
-
SSDEEP
49152:81vqjd/QIgW2b4VTPA3Op4DzIwNHVj+GfWWF:81vqjhgW2bqbhmjN1Vp
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1