General
-
Target
db69dc47e177e79a390089b72d715295_JaffaCakes118
-
Size
12KB
-
Sample
241209-zbk6lsvqcl
-
MD5
db69dc47e177e79a390089b72d715295
-
SHA1
836655afa5624cf81b6e6d02dfa0c149e393cf2e
-
SHA256
934dbbfe39728292a5f2d44d53087b7add0205e00d901cd02d3103df997e21a9
-
SHA512
96c0d15fc42d91b92c2db0f65d7bfe0c23af9324b890a88a0d61349c9be85cfdcd23449c10387ecdaff3bfd3ec99e13eb96a79f45868a60b0c82e5671f1090a5
-
SSDEEP
192:y/TrG62a6B10k3g4fXk1iTV3HGc7EkpAqEjvu2q9C/YpXnAITZfPtRMTa/C+U:yebFNw4Pk1itKkpAjjI2YpdmTao
Behavioral task
behavioral1
Sample
db69dc47e177e79a390089b72d715295_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db69dc47e177e79a390089b72d715295_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
db69dc47e177e79a390089b72d715295_JaffaCakes118
-
Size
12KB
-
MD5
db69dc47e177e79a390089b72d715295
-
SHA1
836655afa5624cf81b6e6d02dfa0c149e393cf2e
-
SHA256
934dbbfe39728292a5f2d44d53087b7add0205e00d901cd02d3103df997e21a9
-
SHA512
96c0d15fc42d91b92c2db0f65d7bfe0c23af9324b890a88a0d61349c9be85cfdcd23449c10387ecdaff3bfd3ec99e13eb96a79f45868a60b0c82e5671f1090a5
-
SSDEEP
192:y/TrG62a6B10k3g4fXk1iTV3HGc7EkpAqEjvu2q9C/YpXnAITZfPtRMTa/C+U:yebFNw4Pk1itKkpAjjI2YpdmTao
-
Renames multiple (17512) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1