General
-
Target
JaffaCakes118_9f76ce9624b562e8d7ea3664f07486f8
-
Size
688KB
-
Sample
250205-pa8keaxkgm
-
MD5
9f76ce9624b562e8d7ea3664f07486f8
-
SHA1
b798277fcb74093d9ef746df141c60cd7e0bbc8a
-
SHA256
a257c7e31548a76e478e4c9aa50734ad200b0b98d7a93edbc432fe6121a90dd4
-
SHA512
bf6d00728c3c86094e612b33356c19ad95055d22c16d9a43ba9d99e7096f827e0822508f85d47715265473f08545702c9024afe41a4b3cefd1729e6bab697c90
-
SSDEEP
12288:nTHrK5H1KtZVFVcZz8OHXW9etAlyl07KbWbTmsbYUdaimbx9b+NbP2cfkRVy8oS:brK5H18VFJOdl07KsmjUdaP9qVP2cf+y
Behavioral task
behavioral1
Sample
JaffaCakes118_9f76ce9624b562e8d7ea3664f07486f8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9f76ce9624b562e8d7ea3664f07486f8.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
latentbot
essstzttztz.zapto.org
Targets
-
-
Target
JaffaCakes118_9f76ce9624b562e8d7ea3664f07486f8
-
Size
688KB
-
MD5
9f76ce9624b562e8d7ea3664f07486f8
-
SHA1
b798277fcb74093d9ef746df141c60cd7e0bbc8a
-
SHA256
a257c7e31548a76e478e4c9aa50734ad200b0b98d7a93edbc432fe6121a90dd4
-
SHA512
bf6d00728c3c86094e612b33356c19ad95055d22c16d9a43ba9d99e7096f827e0822508f85d47715265473f08545702c9024afe41a4b3cefd1729e6bab697c90
-
SSDEEP
12288:nTHrK5H1KtZVFVcZz8OHXW9etAlyl07KbWbTmsbYUdaimbx9b+NbP2cfkRVy8oS:brK5H18VFJOdl07KsmjUdaP9qVP2cf+y
-
Blackshades family
-
Blackshades payload
-
Latentbot family
-
Modifies firewall policy service
-
UAC bypass
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4