Resubmissions
13-01-2025 01:42
250113-b4zygaslbq 412-01-2025 20:44
250112-zjcjfa1lem 412-01-2025 20:43
250112-zhw7fs1lcr 412-01-2025 20:19
250112-y3475aznhp 412-01-2025 20:18
250112-y29q8aznfp 412-01-2025 20:10
250112-yxqsjszmam 112-01-2025 19:38
250112-ycrt4symdl 812-01-2025 19:36
250112-ybj3waylgk 412-01-2025 19:33
250112-x9t53aylam 412-01-2025 19:19
250112-x1jmzaxqfj 6General
-
Target
JaffaCakes118_10e348c6059abdb25d0b650ce3591a7e
-
Size
6KB
-
Sample
250112-ycrt4symdl
-
MD5
10e348c6059abdb25d0b650ce3591a7e
-
SHA1
82c10f89b940adf2feb110115fdbcb0d4604d745
-
SHA256
4d0d51e3e1ed877bf2a7c27830005955a67dd923910f69d43d565537ab9b6871
-
SHA512
b80f6515da161ff39ad681c115d991b4ace53621900210cef272810e6c3ec4da590e138686280220dd71e0d93da19ee1f20f704679da6c67502de498c44468e1
-
SSDEEP
96:uzVs+ux7UhYtLLY1k9o84d12ef7CSTUrZcEZ7ru7f:csz7UhYtAYS/+b76f
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_10e348c6059abdb25d0b650ce3591a7e.html
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_10e348c6059abdb25d0b650ce3591a7e
-
Size
6KB
-
MD5
10e348c6059abdb25d0b650ce3591a7e
-
SHA1
82c10f89b940adf2feb110115fdbcb0d4604d745
-
SHA256
4d0d51e3e1ed877bf2a7c27830005955a67dd923910f69d43d565537ab9b6871
-
SHA512
b80f6515da161ff39ad681c115d991b4ace53621900210cef272810e6c3ec4da590e138686280220dd71e0d93da19ee1f20f704679da6c67502de498c44468e1
-
SSDEEP
96:uzVs+ux7UhYtLLY1k9o84d12ef7CSTUrZcEZ7ru7f:csz7UhYtAYS/+b76f
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1