General
-
Target
JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce
-
Size
1.8MB
-
Sample
250107-rb96qswldj
-
MD5
671abad82fb56ab716e9e0ffbca116ce
-
SHA1
3707df01e839d5b67604debfbc762011593eb822
-
SHA256
00d778b5fc11785ec2e51beb292a872a790a54a48889558ca64f03d8e9a1a6fd
-
SHA512
c0d560081734ade5adcc32d401a014b53410270e1a8e97065bf2c04decdeece555762b6834dd20366aa4b75586a6dcdb6616f7b004d8ff429f3681d862bc2bdf
-
SSDEEP
49152:CG6rYHQQFDut9t96xHVur1h63EuHenNMZ+Kzi:q8HQSosHM63EEWNMvzi
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce
-
Size
1.8MB
-
MD5
671abad82fb56ab716e9e0ffbca116ce
-
SHA1
3707df01e839d5b67604debfbc762011593eb822
-
SHA256
00d778b5fc11785ec2e51beb292a872a790a54a48889558ca64f03d8e9a1a6fd
-
SHA512
c0d560081734ade5adcc32d401a014b53410270e1a8e97065bf2c04decdeece555762b6834dd20366aa4b75586a6dcdb6616f7b004d8ff429f3681d862bc2bdf
-
SSDEEP
49152:CG6rYHQQFDut9t96xHVur1h63EuHenNMZ+Kzi:q8HQSosHM63EEWNMvzi
-
Modifies WinLogon for persistence
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor payload
-
Webmonitor family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Impair Defenses
1Indicator Removal
1File Deletion
1Modify Registry
1