General
-
Target
JaffaCakes118_800dd2aeba8bce13665e587b9efdfe9f
-
Size
2.9MB
-
Sample
250202-x56nasvqhy
-
MD5
800dd2aeba8bce13665e587b9efdfe9f
-
SHA1
498e0b2057afeecfb5bcca3e840125b5953cc589
-
SHA256
588b2bdeefdea9998bf5c62cfc69b29180c58860f4b317db573401a4b7bc1b2f
-
SHA512
307c2503239e543d874cedc6335fc72071c4504591b6223aa74598721e5d861ac07cbcabc785753c182950935c4b5fc68293e2b21d4847e53433e75cf857fe09
-
SSDEEP
49152:Nepaicm6+rWY73xyPBkmz9xFgosY0WMYQ52Ku:lm6VY73xG6UnTEWkdu
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_800dd2aeba8bce13665e587b9efdfe9f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_800dd2aeba8bce13665e587b9efdfe9f.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
JaffaCakes118_800dd2aeba8bce13665e587b9efdfe9f
-
Size
2.9MB
-
MD5
800dd2aeba8bce13665e587b9efdfe9f
-
SHA1
498e0b2057afeecfb5bcca3e840125b5953cc589
-
SHA256
588b2bdeefdea9998bf5c62cfc69b29180c58860f4b317db573401a4b7bc1b2f
-
SHA512
307c2503239e543d874cedc6335fc72071c4504591b6223aa74598721e5d861ac07cbcabc785753c182950935c4b5fc68293e2b21d4847e53433e75cf857fe09
-
SSDEEP
49152:Nepaicm6+rWY73xyPBkmz9xFgosY0WMYQ52Ku:lm6VY73xG6UnTEWkdu
-
Blackshades family
-
Blackshades payload
-
Modifies firewall policy service
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4