General
-
Target
a84fbfcea2b58022e607879037439034_JaffaCakes118
-
Size
6.8MB
-
Sample
241127-rzy4datnhk
-
MD5
a84fbfcea2b58022e607879037439034
-
SHA1
0206c493ddd26d98da41b2275f58650ccd51b2a3
-
SHA256
7bdba11575e35a256352e15ea53f5b17d9ba3713511ea7404c6f9a85313d4f32
-
SHA512
095086ae0b2b0157d7af8d34a3345484c934e7d1c5e14d7a98a823d7e3ff1e355418282e15f86406ca43fb51a632be438b6c0b87dfbb90301a6ab79c8c8a9ea4
-
SSDEEP
196608:FK5Kz2OOHyL6NfhPLfxyN27aTD/XTiNvaVLQuqxF4:GKz2OIq6xfa3/XTiNieF4
Static task
static1
Behavioral task
behavioral1
Sample
a84fbfcea2b58022e607879037439034_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a84fbfcea2b58022e607879037439034_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
a84fbfcea2b58022e607879037439034_JaffaCakes118
-
Size
6.8MB
-
MD5
a84fbfcea2b58022e607879037439034
-
SHA1
0206c493ddd26d98da41b2275f58650ccd51b2a3
-
SHA256
7bdba11575e35a256352e15ea53f5b17d9ba3713511ea7404c6f9a85313d4f32
-
SHA512
095086ae0b2b0157d7af8d34a3345484c934e7d1c5e14d7a98a823d7e3ff1e355418282e15f86406ca43fb51a632be438b6c0b87dfbb90301a6ab79c8c8a9ea4
-
SSDEEP
196608:FK5Kz2OOHyL6NfhPLfxyN27aTD/XTiNvaVLQuqxF4:GKz2OIq6xfa3/XTiNieF4
-
Rms family
-
Modifies Windows Firewall
-
Server Software Component: Terminal Services DLL
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies WinLogon
-
Hide Artifacts: Hidden Users
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
3Hidden Files and Directories
2Hidden Users
1Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
1