General
-
Target
fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118
-
Size
93KB
-
Sample
241220-1vd23svrbr
-
MD5
fcd1cdfe358c3b7c95e10cf72dbf727f
-
SHA1
7c5c487471db6b1702085fd880a931a819baa264
-
SHA256
d95ae7b09fc599fa5ef99c04131117f9b8f9432b3b4aa9cf8492535f8d71ceae
-
SHA512
30ca7a429aa4b1b3a877c6b8b83e3f957c2cb5a7a06d2ad63e0be5e85ade27f0d3255d8c0c671150013c01546369052882f5db77997f3980148a8b7a3a47caa6
-
SSDEEP
1536:UHedaEV1N3QjlwBgiZDASIKwJJYut9OLod6/d3Vb4fcXwWx+7oRW8pO+W/O:Kedai/3ywBgirIBL1qd3VbrXp+7ow+D
Behavioral task
behavioral1
Sample
fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118
-
Size
93KB
-
MD5
fcd1cdfe358c3b7c95e10cf72dbf727f
-
SHA1
7c5c487471db6b1702085fd880a931a819baa264
-
SHA256
d95ae7b09fc599fa5ef99c04131117f9b8f9432b3b4aa9cf8492535f8d71ceae
-
SHA512
30ca7a429aa4b1b3a877c6b8b83e3f957c2cb5a7a06d2ad63e0be5e85ade27f0d3255d8c0c671150013c01546369052882f5db77997f3980148a8b7a3a47caa6
-
SSDEEP
1536:UHedaEV1N3QjlwBgiZDASIKwJJYut9OLod6/d3Vb4fcXwWx+7oRW8pO+W/O:Kedai/3ywBgirIBL1qd3VbrXp+7ow+D
-
Creates new service(s)
-
Downloads MZ/PE file
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Possible privilege escalation attempt
-
A potential corporate email address has been identified in the URL: currency-file@1
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1