General
-
Target
JaffaCakes118_52674d77aa447fa73b70046a3e167983
-
Size
532KB
-
Sample
250305-rmetza1ls4
-
MD5
52674d77aa447fa73b70046a3e167983
-
SHA1
7c6524d261a89df25c41716333a511db6a439c69
-
SHA256
aa2167714b7d8b47ee961fcdf4f983dcaddf82d9686b876a7f3cb428024a05e4
-
SHA512
ba1bf9d01b0c910091b1c3475c6a04305fa8e64e450b66737fa790e265841bc3793dbb455faf6af6e1896da17595604c0ef31dc703762596b63d94b8b742ed2f
-
SSDEEP
12288:a4TwPgjDxrz3UTnSDnj2bm0tW1thDqnKTHSTQUy5y:hOgjR3hrC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_52674d77aa447fa73b70046a3e167983.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_52674d77aa447fa73b70046a3e167983.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
JaffaCakes118_52674d77aa447fa73b70046a3e167983
-
Size
532KB
-
MD5
52674d77aa447fa73b70046a3e167983
-
SHA1
7c6524d261a89df25c41716333a511db6a439c69
-
SHA256
aa2167714b7d8b47ee961fcdf4f983dcaddf82d9686b876a7f3cb428024a05e4
-
SHA512
ba1bf9d01b0c910091b1c3475c6a04305fa8e64e450b66737fa790e265841bc3793dbb455faf6af6e1896da17595604c0ef31dc703762596b63d94b8b742ed2f
-
SSDEEP
12288:a4TwPgjDxrz3UTnSDnj2bm0tW1thDqnKTHSTQUy5y:hOgjR3hrC
-
Blackshades family
-
Blackshades payload
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1