Overview
overview
10Static
static
3JaffaCakes...4e.exe
windows7-x64
10JaffaCakes...4e.exe
windows10-2004-x64
10JaffaCakes...4e.exe
android-10-x64
JaffaCakes...4e.exe
android-13-x64
JaffaCakes...4e.exe
macos-10.15-amd64
JaffaCakes...4e.exe
ubuntu-18.04-amd64
JaffaCakes...4e.exe
debian-9-armhf
JaffaCakes...4e.exe
debian-9-mips
JaffaCakes...4e.exe
debian-9-mipsel
General
-
Target
JaffaCakes118_b6124b4ca98f6d73cc84e07590d4ee4e
-
Size
7.0MB
-
Sample
250207-mmag2axqct
-
MD5
b6124b4ca98f6d73cc84e07590d4ee4e
-
SHA1
05be8d0627e7212e5a14eb87e9f73d26a51d2e60
-
SHA256
24852e13f100fe9f4728d609bd26cb5496fedb178e7502cc52e0c9b391f5e004
-
SHA512
b36d24aa1ad484c6285f2687b2e2b6860dc99efbea1f1ec468675e0ff922cc2d7e4919a474f7656eb7534ae1a2e9797e9cb839e39ac272daa888fab4b084a5a9
-
SSDEEP
196608:XEZZfiwJ7LrzzmndmzxEnra4xNL1tzhemJie:GptkegT11sm
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b6124b4ca98f6d73cc84e07590d4ee4e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b6124b4ca98f6d73cc84e07590d4ee4e.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
JaffaCakes118_b6124b4ca98f6d73cc84e07590d4ee4e.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
JaffaCakes118_b6124b4ca98f6d73cc84e07590d4ee4e.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
JaffaCakes118_b6124b4ca98f6d73cc84e07590d4ee4e.exe
Resource
macos-20241106-en
Behavioral task
behavioral6
Sample
JaffaCakes118_b6124b4ca98f6d73cc84e07590d4ee4e.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral7
Sample
JaffaCakes118_b6124b4ca98f6d73cc84e07590d4ee4e.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral8
Sample
JaffaCakes118_b6124b4ca98f6d73cc84e07590d4ee4e.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral9
Sample
JaffaCakes118_b6124b4ca98f6d73cc84e07590d4ee4e.exe
Resource
debian9-mipsel-20240226-en
Malware Config
Targets
-
-
Target
JaffaCakes118_b6124b4ca98f6d73cc84e07590d4ee4e
-
Size
7.0MB
-
MD5
b6124b4ca98f6d73cc84e07590d4ee4e
-
SHA1
05be8d0627e7212e5a14eb87e9f73d26a51d2e60
-
SHA256
24852e13f100fe9f4728d609bd26cb5496fedb178e7502cc52e0c9b391f5e004
-
SHA512
b36d24aa1ad484c6285f2687b2e2b6860dc99efbea1f1ec468675e0ff922cc2d7e4919a474f7656eb7534ae1a2e9797e9cb839e39ac272daa888fab4b084a5a9
-
SSDEEP
196608:XEZZfiwJ7LrzzmndmzxEnra4xNL1tzhemJie:GptkegT11sm
-
Blackshades family
-
Blackshades payload
-
Modifies firewall policy service
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1