General
-
Target
d52860d6be6ea1ec9f809d6527d46b06_JaffaCakes118
-
Size
8.5MB
-
Sample
241208-enlbxs1rfx
-
MD5
d52860d6be6ea1ec9f809d6527d46b06
-
SHA1
9c5a0e6266eca4f86bd38efddc8551e95451158f
-
SHA256
39326cdd0c863e1766ecc3d119ec18fdaa93ef886cfbc887f76784f745df73e4
-
SHA512
64d356059ef696a8297a7e0f28b3108ee1a8bdb68edde0b52667fbff1b46e9daf0c42fdc545795443fbe7fe7db6734935d147f01bb3101f1f0d2fdf2e25a6000
-
SSDEEP
196608:UzE5qkxHYUggVmv8vWkd08L+u3fCbrKtSBJCLSeZ:IE5LiUgsPWC08F3qitSBYlZ
Static task
static1
Behavioral task
behavioral1
Sample
d52860d6be6ea1ec9f809d6527d46b06_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d52860d6be6ea1ec9f809d6527d46b06_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
privateloader
http://37.0.8.235/proxies.txt
http://37.0.11.8/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.11.9
Extracted
ffdroider
http://186.2.171.3
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
d52860d6be6ea1ec9f809d6527d46b06_JaffaCakes118
-
Size
8.5MB
-
MD5
d52860d6be6ea1ec9f809d6527d46b06
-
SHA1
9c5a0e6266eca4f86bd38efddc8551e95451158f
-
SHA256
39326cdd0c863e1766ecc3d119ec18fdaa93ef886cfbc887f76784f745df73e4
-
SHA512
64d356059ef696a8297a7e0f28b3108ee1a8bdb68edde0b52667fbff1b46e9daf0c42fdc545795443fbe7fe7db6734935d147f01bb3101f1f0d2fdf2e25a6000
-
SSDEEP
196608:UzE5qkxHYUggVmv8vWkd08L+u3fCbrKtSBJCLSeZ:IE5LiUgsPWC08F3qitSBYlZ
-
Detect Fabookie payload
-
FFDroider payload
-
Fabookie family
-
Ffdroider family
-
Glupteba family
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1