General
-
Target
f9463d9c2f292beae964eef71739e060_JaffaCakes118
-
Size
283KB
-
Sample
241217-3qq7yssqfv
-
MD5
f9463d9c2f292beae964eef71739e060
-
SHA1
27629e0354a72d063772ab0a44c36898b51a1194
-
SHA256
be3453f1cc2e279d9dcb10b1238d0c492fcb21537340444a7859d5c317c7bca2
-
SHA512
2e9ae41abd87531e2412db81893fcc15a9628f6dcbfd8e696af6eb8af8ee72f2757adae3c9da5bcd108be651fa4ced6f065edfd01a1bf60a7d7c66c922040f82
-
SSDEEP
3072:1iCKSxGuKheuHOMTzJGCtV0qxPgVGJ4g69tc6wiXm+oVdDsNMhE4iYs5HayMiESK:1QnJxBJ4g6oiW9pEMhECscv3Aj/gIYE
Static task
static1
Behavioral task
behavioral1
Sample
f9463d9c2f292beae964eef71739e060_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9463d9c2f292beae964eef71739e060_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f9463d9c2f292beae964eef71739e060_JaffaCakes118
-
Size
283KB
-
MD5
f9463d9c2f292beae964eef71739e060
-
SHA1
27629e0354a72d063772ab0a44c36898b51a1194
-
SHA256
be3453f1cc2e279d9dcb10b1238d0c492fcb21537340444a7859d5c317c7bca2
-
SHA512
2e9ae41abd87531e2412db81893fcc15a9628f6dcbfd8e696af6eb8af8ee72f2757adae3c9da5bcd108be651fa4ced6f065edfd01a1bf60a7d7c66c922040f82
-
SSDEEP
3072:1iCKSxGuKheuHOMTzJGCtV0qxPgVGJ4g69tc6wiXm+oVdDsNMhE4iYs5HayMiESK:1QnJxBJ4g6oiW9pEMhECscv3Aj/gIYE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Disables Task Manager via registry modification
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1