General
-
Target
JaffaCakes118_a168a3e87ad513360084f51576a80435
-
Size
189KB
-
Sample
250408-yyq5psz1gy
-
MD5
a168a3e87ad513360084f51576a80435
-
SHA1
8c1ab58e960ec7bbac9d1994cc615e81ee037393
-
SHA256
f9ebbf31433fe096b85efd20e808bf811fd0623406ad528246a4ec24d2380ca4
-
SHA512
b3acc494ca323092c0235ca444e71097845294a19512651bc9de45a17c7fdb14ad771718606d96ded83f3823fb9adc912945cb8d13d6a6d4d5bd924ca58531ac
-
SSDEEP
3072:a6JnKicCmrF7TLZYXSLS/BaKqdaPiRRgI/ZDsMRaesdy9/VkGabUf/b1p5A7:aEPcVF7TtqPEaPiRSlMwesd6kvbe/Jnk
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a168a3e87ad513360084f51576a80435.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
JaffaCakes118_a168a3e87ad513360084f51576a80435
-
Size
189KB
-
MD5
a168a3e87ad513360084f51576a80435
-
SHA1
8c1ab58e960ec7bbac9d1994cc615e81ee037393
-
SHA256
f9ebbf31433fe096b85efd20e808bf811fd0623406ad528246a4ec24d2380ca4
-
SHA512
b3acc494ca323092c0235ca444e71097845294a19512651bc9de45a17c7fdb14ad771718606d96ded83f3823fb9adc912945cb8d13d6a6d4d5bd924ca58531ac
-
SSDEEP
3072:a6JnKicCmrF7TLZYXSLS/BaKqdaPiRRgI/ZDsMRaesdy9/VkGabUf/b1p5A7:aEPcVF7TtqPEaPiRSlMwesd6kvbe/Jnk
-
Blackshades family
-
Blackshades payload
-
Modifies firewall policy service
-
UAC bypass
-
Windows security bypass
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
9