General
-
Target
JaffaCakes118_766960724e07eb982c982fc86a1141c2
-
Size
1.3MB
-
Sample
250116-pr6r5s1nhl
-
MD5
766960724e07eb982c982fc86a1141c2
-
SHA1
e481922d7fdec7634229d4c772136329173f238f
-
SHA256
76ad742cdd3171559091f30f6483e23e3635c8b25e4edfa6b557ec92914502a5
-
SHA512
dbfdecdb9e47014ad7da5008f5387a50909b6415520ab1c84a62fec64fce0b672a2250f81124bd586e1b8e7be874c3fb375adb4ebe4bcd1b0cac5e36896f791c
-
SSDEEP
24576:7eMXpgE2fp4KTdekeMXpgE2fp4KTde0YqoWfVeRhLh7hesvzRkoW:NXtsPXtsVYjWfWhLh7hVbRlW
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_766960724e07eb982c982fc86a1141c2.exe
Resource
win7-20240903-en
Malware Config
Extracted
latentbot
gniewkowiec0359.zapto.org
Targets
-
-
Target
JaffaCakes118_766960724e07eb982c982fc86a1141c2
-
Size
1.3MB
-
MD5
766960724e07eb982c982fc86a1141c2
-
SHA1
e481922d7fdec7634229d4c772136329173f238f
-
SHA256
76ad742cdd3171559091f30f6483e23e3635c8b25e4edfa6b557ec92914502a5
-
SHA512
dbfdecdb9e47014ad7da5008f5387a50909b6415520ab1c84a62fec64fce0b672a2250f81124bd586e1b8e7be874c3fb375adb4ebe4bcd1b0cac5e36896f791c
-
SSDEEP
24576:7eMXpgE2fp4KTdekeMXpgE2fp4KTde0YqoWfVeRhLh7hesvzRkoW:NXtsPXtsVYjWfWhLh7hVbRlW
-
Darkcomet family
-
Latentbot family
-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1