General
-
Target
ba40883e005f64abbb765f436a9f535c_JaffaCakes118
-
Size
685KB
-
Sample
241202-1apyvazjfq
-
MD5
ba40883e005f64abbb765f436a9f535c
-
SHA1
a1260d2f6ba066b0c402af1f525b26bb8a60e716
-
SHA256
1ac5efef5495c03e0d32c791d6f145ac0d3373a7cd3ddf0003be9d8b19263ee9
-
SHA512
1bb49b857dba2a2da4ab0ffa62a7ba44984674538aaab7d2d333b6a1750204e87c64abf7f5b21391a9a93a5c8add2b3f30c1a4a350fdd801bd90708edb2ab423
-
SSDEEP
12288:rIVgjRD8IuBITB2hcgc/Co0GNk88ZJgaZMaSQsd9vOgG5f:rIajRgIuV61/iGV8YaZMaSbd9vOXf
Static task
static1
Behavioral task
behavioral1
Sample
ba40883e005f64abbb765f436a9f535c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ba40883e005f64abbb765f436a9f535c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ba40883e005f64abbb765f436a9f535c_JaffaCakes118
-
Size
685KB
-
MD5
ba40883e005f64abbb765f436a9f535c
-
SHA1
a1260d2f6ba066b0c402af1f525b26bb8a60e716
-
SHA256
1ac5efef5495c03e0d32c791d6f145ac0d3373a7cd3ddf0003be9d8b19263ee9
-
SHA512
1bb49b857dba2a2da4ab0ffa62a7ba44984674538aaab7d2d333b6a1750204e87c64abf7f5b21391a9a93a5c8add2b3f30c1a4a350fdd801bd90708edb2ab423
-
SSDEEP
12288:rIVgjRD8IuBITB2hcgc/Co0GNk88ZJgaZMaSQsd9vOgG5f:rIajRgIuV61/iGV8YaZMaSbd9vOXf
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Remote Service Session Hijacking: RDP Hijacking
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
-
Indicator Removal: Network Share Connection Removal
Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Modifies WinLogon
-
Drops file in System32 directory
-
Hide Artifacts: Hidden Users
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Users
1Indicator Removal
1Network Share Connection Removal
1Modify Registry
2