General
-
Target
72d70e94e54ba232ba3f798699669990_JaffaCakes118
-
Size
446KB
-
Sample
241024-h5vhpsycmd
-
MD5
72d70e94e54ba232ba3f798699669990
-
SHA1
16f257adf89a56a93a6be45bf470a71d4d570d26
-
SHA256
93b1135cdbed6e1bf1269248d28e5a5f74fb5cb234c6385b56d025839bada289
-
SHA512
e024605c3469c27d470dc2cdb17bdef55507c80feb81969531277f96083d96511ab4e14d16f61f1723e0a97a69f6c201cfb34ac3584da8ba415e5f05582a139d
-
SSDEEP
12288:rFQyFgwMQsXS3NG5ddoM4YQYgDhgvMph5O0ZcQ:rSyFgTQ9NydHQ3evs15
Static task
static1
Behavioral task
behavioral1
Sample
72d70e94e54ba232ba3f798699669990_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
72d70e94e54ba232ba3f798699669990_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
gozi
Extracted
gozi
3000
unikymprogress.ru
-
build
214664
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
72d70e94e54ba232ba3f798699669990_JaffaCakes118
-
Size
446KB
-
MD5
72d70e94e54ba232ba3f798699669990
-
SHA1
16f257adf89a56a93a6be45bf470a71d4d570d26
-
SHA256
93b1135cdbed6e1bf1269248d28e5a5f74fb5cb234c6385b56d025839bada289
-
SHA512
e024605c3469c27d470dc2cdb17bdef55507c80feb81969531277f96083d96511ab4e14d16f61f1723e0a97a69f6c201cfb34ac3584da8ba415e5f05582a139d
-
SSDEEP
12288:rFQyFgwMQsXS3NG5ddoM4YQYgDhgvMph5O0ZcQ:rSyFgTQ9NydHQ3evs15
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1