General
-
Target
JaffaCakes118_368218137de5e445f29b93d67b9ab9d8
-
Size
275KB
-
Sample
250126-r7q3qstrfv
-
MD5
368218137de5e445f29b93d67b9ab9d8
-
SHA1
05af6ed8562831f055738bdb271517dec0ab5a64
-
SHA256
0732dad0befb8c2e0b7a43ddbbbef998e43d68a6d30888515446ec020bbf30d7
-
SHA512
a911fc9d465ddf9e3b056eac4c02d7c196ed0cece3365268deab0f37110d91a745371134df1d8eaedb50c0182d82952b3858c48d66868614770863960a8f2cf5
-
SSDEEP
6144:pYrCtem7bPw041CWmrNaPd7ShlfUrJvI35M2f0rla:sm/4PmrfwAM2Ea
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_368218137de5e445f29b93d67b9ab9d8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_368218137de5e445f29b93d67b9ab9d8.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_368218137de5e445f29b93d67b9ab9d8
-
Size
275KB
-
MD5
368218137de5e445f29b93d67b9ab9d8
-
SHA1
05af6ed8562831f055738bdb271517dec0ab5a64
-
SHA256
0732dad0befb8c2e0b7a43ddbbbef998e43d68a6d30888515446ec020bbf30d7
-
SHA512
a911fc9d465ddf9e3b056eac4c02d7c196ed0cece3365268deab0f37110d91a745371134df1d8eaedb50c0182d82952b3858c48d66868614770863960a8f2cf5
-
SSDEEP
6144:pYrCtem7bPw041CWmrNaPd7ShlfUrJvI35M2f0rla:sm/4PmrfwAM2Ea
-
Cycbot family
-
Detects Cycbot payload
Cycbot is a backdoor and trojan written in C++.
-
Modifies security service
-
Pony family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3