General
-
Target
JaffaCakes118_223de80a2f18831de7e7b6aa45be24c2
-
Size
340KB
-
Sample
250225-hvjy8avpy3
-
MD5
223de80a2f18831de7e7b6aa45be24c2
-
SHA1
f9f39ca058dbcdb548188d006336a0af54c4f83a
-
SHA256
e8ae1b84db6f09d5de7cf419f71231bbbdb3cf0a2d2d80b4716b52e4dc1f14bb
-
SHA512
183da78119e3691e985669c6d7fd20e1f1fafaf4eab8b80fc04076c25733aab4e6a25c116d7d94544c6094775f30d50a28013389e423fc6856cf23396cef9f4b
-
SSDEEP
6144:uO31rlz3jYwiK6DvhtEVwKppp1HAa7xJISiAMI4uPZ1k:tlbUwiKihtEVwKXHAa7xao+W1k
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_223de80a2f18831de7e7b6aa45be24c2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_223de80a2f18831de7e7b6aa45be24c2.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
JaffaCakes118_223de80a2f18831de7e7b6aa45be24c2
-
Size
340KB
-
MD5
223de80a2f18831de7e7b6aa45be24c2
-
SHA1
f9f39ca058dbcdb548188d006336a0af54c4f83a
-
SHA256
e8ae1b84db6f09d5de7cf419f71231bbbdb3cf0a2d2d80b4716b52e4dc1f14bb
-
SHA512
183da78119e3691e985669c6d7fd20e1f1fafaf4eab8b80fc04076c25733aab4e6a25c116d7d94544c6094775f30d50a28013389e423fc6856cf23396cef9f4b
-
SSDEEP
6144:uO31rlz3jYwiK6DvhtEVwKppp1HAa7xJISiAMI4uPZ1k:tlbUwiKihtEVwKXHAa7xao+W1k
-
Blackshades family
-
Blackshades payload
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1