General
-
Target
JaffaCakes118_5a1f0ba6ab69561d7edc58c56c7aca78
-
Size
763KB
-
Sample
250309-tz8nxsvqv3
-
MD5
5a1f0ba6ab69561d7edc58c56c7aca78
-
SHA1
adf1d995abbfbfe04e08eebcb077af8c63df524f
-
SHA256
2ae7e0d17d5e8ce730c11a9aa744ac5089e23d9313286da3c27dcee082d6e59f
-
SHA512
1ab3b5678423c24e768ff7567648e8fae4002a9f9e84617f3b4c8d45b3fa09cc994172dff1fea2d335a6677c02f3860c2e7543346a6c7bad3463d944611c6d52
-
SSDEEP
12288:a6Wq4aaE6KwyF5L0Y2D1PqLjna3ZxUoJGdKZCsS8+m2W6hGcN1nuevG2MXuE:4thEVaPqL28oJGdfsj+mUhZuL2+
Behavioral task
behavioral1
Sample
JaffaCakes118_5a1f0ba6ab69561d7edc58c56c7aca78.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5a1f0ba6ab69561d7edc58c56c7aca78.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
JaffaCakes118_5a1f0ba6ab69561d7edc58c56c7aca78
-
Size
763KB
-
MD5
5a1f0ba6ab69561d7edc58c56c7aca78
-
SHA1
adf1d995abbfbfe04e08eebcb077af8c63df524f
-
SHA256
2ae7e0d17d5e8ce730c11a9aa744ac5089e23d9313286da3c27dcee082d6e59f
-
SHA512
1ab3b5678423c24e768ff7567648e8fae4002a9f9e84617f3b4c8d45b3fa09cc994172dff1fea2d335a6677c02f3860c2e7543346a6c7bad3463d944611c6d52
-
SSDEEP
12288:a6Wq4aaE6KwyF5L0Y2D1PqLjna3ZxUoJGdKZCsS8+m2W6hGcN1nuevG2MXuE:4thEVaPqL28oJGdfsj+mUhZuL2+
-
Blackshades family
-
Blackshades payload
-
Modifies firewall policy service
-
UAC bypass
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
7