General
-
Target
JaffaCakes118_9443e840ac07a44d629fd0f37d027252
-
Size
363KB
-
Sample
250329-xyx3kssk19
-
MD5
9443e840ac07a44d629fd0f37d027252
-
SHA1
cc116c036a943552fc407315b30a184e6efb0966
-
SHA256
2e41bbaaee53c79ad69bd90a4d5bd4a6b8703aa5f90ebd154c9af0c63972c844
-
SHA512
a10be712392bd7a52b2ca71f1237e0da2096cb1bcc77e9d509b8afc59973b06f69331c40815503379a1485aed4caed1fa3c3601c60860a1a067b2984052716d4
-
SSDEEP
6144:yKWnMbzIHKAYx23WyCRxA9WhO4ZDSczLVwq9tXfzB/dvmrmab6yH:ywoqAY2WDRnO6dwq/X7Btzc
Behavioral task
behavioral1
Sample
JaffaCakes118_9443e840ac07a44d629fd0f37d027252.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9443e840ac07a44d629fd0f37d027252.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
JaffaCakes118_9443e840ac07a44d629fd0f37d027252
-
Size
363KB
-
MD5
9443e840ac07a44d629fd0f37d027252
-
SHA1
cc116c036a943552fc407315b30a184e6efb0966
-
SHA256
2e41bbaaee53c79ad69bd90a4d5bd4a6b8703aa5f90ebd154c9af0c63972c844
-
SHA512
a10be712392bd7a52b2ca71f1237e0da2096cb1bcc77e9d509b8afc59973b06f69331c40815503379a1485aed4caed1fa3c3601c60860a1a067b2984052716d4
-
SSDEEP
6144:yKWnMbzIHKAYx23WyCRxA9WhO4ZDSczLVwq9tXfzB/dvmrmab6yH:ywoqAY2WDRnO6dwq/X7Btzc
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1