General
-
Target
JaffaCakes118_98557c0d1b535086bec54d7149a4f3db
-
Size
245KB
-
Sample
250330-h3m1vasxax
-
MD5
98557c0d1b535086bec54d7149a4f3db
-
SHA1
2c2e6b26b64aa97e2b58646cf508757bd757e32e
-
SHA256
3ce1eee52dc8fea528222d6bdd72ae63919cd33c373f1ec47583a7cab7dfc6c8
-
SHA512
dfb54d7da09a035f0628f1fac1f3f39a7aeb4bb8938153441b7fb22a18d2a0439619b4b10241126da99857e4e7d838693cbfd43ce3b3bcf624fb21a8c013911b
-
SSDEEP
6144:PLy4KzNoLvn/7fheYFmJBNwcuvJ5uBelDBdJFNkhzR0CW3oS:jyp8nz76H4h5u4lFnghWoS
Behavioral task
behavioral1
Sample
JaffaCakes118_98557c0d1b535086bec54d7149a4f3db.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_98557c0d1b535086bec54d7149a4f3db.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
JaffaCakes118_98557c0d1b535086bec54d7149a4f3db
-
Size
245KB
-
MD5
98557c0d1b535086bec54d7149a4f3db
-
SHA1
2c2e6b26b64aa97e2b58646cf508757bd757e32e
-
SHA256
3ce1eee52dc8fea528222d6bdd72ae63919cd33c373f1ec47583a7cab7dfc6c8
-
SHA512
dfb54d7da09a035f0628f1fac1f3f39a7aeb4bb8938153441b7fb22a18d2a0439619b4b10241126da99857e4e7d838693cbfd43ce3b3bcf624fb21a8c013911b
-
SSDEEP
6144:PLy4KzNoLvn/7fheYFmJBNwcuvJ5uBelDBdJFNkhzR0CW3oS:jyp8nz76H4h5u4lFnghWoS
-
Blackshades family
-
Blackshades payload
-
Modifies firewall policy service
-
UAC bypass
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
5