General
-
Target
6f42522b5beeb70d31d19fdf9854a81a_JaffaCakes118
-
Size
11.8MB
-
Sample
241023-q643jatbqb
-
MD5
6f42522b5beeb70d31d19fdf9854a81a
-
SHA1
e03a1240c6cb12b9131fb67ba7653afa743e401e
-
SHA256
bfd52b9121ffd76cdc7eeb2cf9fa1f229700e0fd5725634390c7f2c8c572cf70
-
SHA512
1f643ea0b547f4bd6a6cc44f0c32d1ecfadd2559d563b15c99a2279a1e68f98ce91b6f0a400330d086c24ae2f8f19a63f4f1bc3366edf412c332cf51ea1b5ed4
-
SSDEEP
12288:oUR4+0lGrUPDHQahTzrdCcrFy55555555555555555555555555555555555555J:ol+PrmrXrd1p
Static task
static1
Behavioral task
behavioral1
Sample
6f42522b5beeb70d31d19fdf9854a81a_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6f42522b5beeb70d31d19fdf9854a81a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Targets
-
-
Target
6f42522b5beeb70d31d19fdf9854a81a_JaffaCakes118
-
Size
11.8MB
-
MD5
6f42522b5beeb70d31d19fdf9854a81a
-
SHA1
e03a1240c6cb12b9131fb67ba7653afa743e401e
-
SHA256
bfd52b9121ffd76cdc7eeb2cf9fa1f229700e0fd5725634390c7f2c8c572cf70
-
SHA512
1f643ea0b547f4bd6a6cc44f0c32d1ecfadd2559d563b15c99a2279a1e68f98ce91b6f0a400330d086c24ae2f8f19a63f4f1bc3366edf412c332cf51ea1b5ed4
-
SSDEEP
12288:oUR4+0lGrUPDHQahTzrdCcrFy55555555555555555555555555555555555555J:ol+PrmrXrd1p
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2