General
-
Target
JaffaCakes118_4a7f3fe0759dc0416b60115aaeaf14a8
-
Size
194KB
-
Sample
250304-clncdswvht
-
MD5
4a7f3fe0759dc0416b60115aaeaf14a8
-
SHA1
aa240da92ccecbdaf048113b23ee7fcd4ef65c0f
-
SHA256
721bd91a3854315623f25dc768709fce070c3bec8752467d36a99f77cd0c7715
-
SHA512
a96a8658ade57541843eef08b04c245ddabdbf6a7bbc9b70f00093d51ccfc53551b75266f92a6cccf499d07f5b5a15d677193a73c9058410ed9fb33afc14d77e
-
SSDEEP
6144:tTOmiU1fW8W+3H+4zuxN5OyE80X/DWZRo/voS:tTOF4OrHvX480vDWZRo/voS
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4a7f3fe0759dc0416b60115aaeaf14a8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4a7f3fe0759dc0416b60115aaeaf14a8.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
JaffaCakes118_4a7f3fe0759dc0416b60115aaeaf14a8
-
Size
194KB
-
MD5
4a7f3fe0759dc0416b60115aaeaf14a8
-
SHA1
aa240da92ccecbdaf048113b23ee7fcd4ef65c0f
-
SHA256
721bd91a3854315623f25dc768709fce070c3bec8752467d36a99f77cd0c7715
-
SHA512
a96a8658ade57541843eef08b04c245ddabdbf6a7bbc9b70f00093d51ccfc53551b75266f92a6cccf499d07f5b5a15d677193a73c9058410ed9fb33afc14d77e
-
SSDEEP
6144:tTOmiU1fW8W+3H+4zuxN5OyE80X/DWZRo/voS:tTOF4OrHvX480vDWZRo/voS
-
Blackshades family
-
Blackshades payload
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1