General
-
Target
JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5
-
Size
288KB
-
Sample
250407-fhbe7syzbt
-
MD5
9de98cdadcfdae589f98eb39bd0c8bb5
-
SHA1
8383e74a018001d0e2f63a4d1db8e311e647c0cf
-
SHA256
8fd31c2e2561c330f23b0cc0e36f70a3b7fedc2bd08c02d1f3f2dd06308f8161
-
SHA512
f578d0622fd57c9c8986d93260d19bc92dda9cb061ffa77fc060aba273ddd5f5daec4ec844d042d8156e25f9341ba835ce9b38d83263fdf71cac66162c3e105f
-
SSDEEP
6144:ddymWtV751hbG5wf+BAcj0qKHWYt7b4bdL+8tvz4AroS:L6joBE3HXt70bNQAroS
Behavioral task
behavioral1
Sample
JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5
-
Size
288KB
-
MD5
9de98cdadcfdae589f98eb39bd0c8bb5
-
SHA1
8383e74a018001d0e2f63a4d1db8e311e647c0cf
-
SHA256
8fd31c2e2561c330f23b0cc0e36f70a3b7fedc2bd08c02d1f3f2dd06308f8161
-
SHA512
f578d0622fd57c9c8986d93260d19bc92dda9cb061ffa77fc060aba273ddd5f5daec4ec844d042d8156e25f9341ba835ce9b38d83263fdf71cac66162c3e105f
-
SSDEEP
6144:ddymWtV751hbG5wf+BAcj0qKHWYt7b4bdL+8tvz4AroS:L6joBE3HXt70bNQAroS
-
Blackshades family
-
Blackshades payload
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
UAC bypass
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
7