General
-
Target
JaffaCakes118_714ebc4ae326449667d7c068e36d5aea
-
Size
3.4MB
-
Sample
250313-tjsb1azkz9
-
MD5
714ebc4ae326449667d7c068e36d5aea
-
SHA1
4d55cfbfbd9743a287dddd4c3083cdf1939a77b5
-
SHA256
5380b5ac4f625b72bbbcf131c89b13be6f4d0f24af0ee1b6663e0f20902b3da4
-
SHA512
56bd9134786df4e1743ec1d99c412024eda67127d5f44928f4863a4f294937ad275d880a9ff3513ca6c44449faafc5297c0247795e6f139f8a3e2b67308c73d1
-
SSDEEP
49152:uAJY6DcvLR9Zn8tIGRH3pLsDzTMbp8TbyGPkGzki0l+ROOROhRpFSS21MzvKu5:BJY6Da9ZfG3YDzTt9cGzki2adRU+tW3
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_714ebc4ae326449667d7c068e36d5aea.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_714ebc4ae326449667d7c068e36d5aea.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
JaffaCakes118_714ebc4ae326449667d7c068e36d5aea
-
Size
3.4MB
-
MD5
714ebc4ae326449667d7c068e36d5aea
-
SHA1
4d55cfbfbd9743a287dddd4c3083cdf1939a77b5
-
SHA256
5380b5ac4f625b72bbbcf131c89b13be6f4d0f24af0ee1b6663e0f20902b3da4
-
SHA512
56bd9134786df4e1743ec1d99c412024eda67127d5f44928f4863a4f294937ad275d880a9ff3513ca6c44449faafc5297c0247795e6f139f8a3e2b67308c73d1
-
SSDEEP
49152:uAJY6DcvLR9Zn8tIGRH3pLsDzTMbp8TbyGPkGzki0l+ROOROhRpFSS21MzvKu5:BJY6Da9ZfG3YDzTt9cGzki2adRU+tW3
-
Disables service(s)
-
Rms family
-
Indicator Removal: Network Share Connection Removal
Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
1Network Share Connection Removal
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1