General
-
Target
JaffaCakes118_575d1d1c7f0456b6c6ef715ec7c8062c
-
Size
269KB
-
Sample
250129-qqa5hsxlfp
-
MD5
575d1d1c7f0456b6c6ef715ec7c8062c
-
SHA1
031e769f7ece6e9feb44f528e0b4c3f50ec4ae10
-
SHA256
a0ae9908d156a23ce271b315675f0f2accfae240dd6162832b6249b16deda554
-
SHA512
52f0b62bdf874f97eba42aeeda326f991c6efaf8f49221fc69415dd65ea2f62e8d8a6d63550d881b0d628fb1e936f91a73940cb855d6e98b905602312945f5ff
-
SSDEEP
6144:8jUMq9rYdDxlTmcDkfkzPn+GD57/GXaE58m6aYdF:84sdNlTmcDS2N7/E58GYdF
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_575d1d1c7f0456b6c6ef715ec7c8062c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_575d1d1c7f0456b6c6ef715ec7c8062c.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
JaffaCakes118_575d1d1c7f0456b6c6ef715ec7c8062c
-
Size
269KB
-
MD5
575d1d1c7f0456b6c6ef715ec7c8062c
-
SHA1
031e769f7ece6e9feb44f528e0b4c3f50ec4ae10
-
SHA256
a0ae9908d156a23ce271b315675f0f2accfae240dd6162832b6249b16deda554
-
SHA512
52f0b62bdf874f97eba42aeeda326f991c6efaf8f49221fc69415dd65ea2f62e8d8a6d63550d881b0d628fb1e936f91a73940cb855d6e98b905602312945f5ff
-
SSDEEP
6144:8jUMq9rYdDxlTmcDkfkzPn+GD57/GXaE58m6aYdF:84sdNlTmcDS2N7/E58GYdF
-
Blackshades family
-
Blackshades payload
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1