General
-
Target
639a8029405074b346b0a9b476b9d8c7_JaffaCakes118
-
Size
589KB
-
Sample
241020-wpfaqstgjl
-
MD5
639a8029405074b346b0a9b476b9d8c7
-
SHA1
66111f5ec57fb20efc01598d16e0e2394785937b
-
SHA256
009333ac83a05ccfbd3e32b64c53e8ad0e9a163a0783c3db4f20ae63c7c03f22
-
SHA512
5623ce567e57d61fea47b27bab2d1ceabc12d7e77bd86871942bdfbe85677ab2eefdccd0d27dcfbc2efcdd5206eea1cd84e16c6cd33029634e08b531bd100619
-
SSDEEP
12288:YG4Zh4ZhsHBq3uAy/GucGEMj/uNcZy4L9iHdQ+HK:R4ZHs+AMGu+ZHHdQ+
Static task
static1
Behavioral task
behavioral1
Sample
639a8029405074b346b0a9b476b9d8c7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
639a8029405074b346b0a9b476b9d8c7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
latentbot
0lalalalaal.zapto.org
Targets
-
-
Target
639a8029405074b346b0a9b476b9d8c7_JaffaCakes118
-
Size
589KB
-
MD5
639a8029405074b346b0a9b476b9d8c7
-
SHA1
66111f5ec57fb20efc01598d16e0e2394785937b
-
SHA256
009333ac83a05ccfbd3e32b64c53e8ad0e9a163a0783c3db4f20ae63c7c03f22
-
SHA512
5623ce567e57d61fea47b27bab2d1ceabc12d7e77bd86871942bdfbe85677ab2eefdccd0d27dcfbc2efcdd5206eea1cd84e16c6cd33029634e08b531bd100619
-
SSDEEP
12288:YG4Zh4ZhsHBq3uAy/GucGEMj/uNcZy4L9iHdQ+HK:R4ZHs+AMGu+ZHHdQ+
Score10/10-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1