General

  • Target

    3450dc38c2ddd5c3c7fb886d9be62306_JaffaCakes118

  • Size

    817KB

  • Sample

    240511-nc5qvsdg7s

  • MD5

    3450dc38c2ddd5c3c7fb886d9be62306

  • SHA1

    5f17aa8c4c19a5f9b59e57a8e0cb8e33d713ed67

  • SHA256

    ae15dc18779d031a0b652b764c0295578517cf05ed228d30f7dc555deb1f84a5

  • SHA512

    ee4f51afc51b04ca2a56125ebcb12f5233c1cb8e307963729560ce3e913ed531c042804fc0b40abdaa579ff1b6f9ad4b70a3c67e6c66595da62b5d327e1c7c66

  • SSDEEP

    12288:UZWtI6RkzweZJys73dOvXDpNjNe8mGOWweZJys73dOvXDpNjNe8m6ut:Uuha8eZJ8NI8weZJ8NI8U

Malware Config

Targets

    • Target

      3450dc38c2ddd5c3c7fb886d9be62306_JaffaCakes118

    • Size

      817KB

    • MD5

      3450dc38c2ddd5c3c7fb886d9be62306

    • SHA1

      5f17aa8c4c19a5f9b59e57a8e0cb8e33d713ed67

    • SHA256

      ae15dc18779d031a0b652b764c0295578517cf05ed228d30f7dc555deb1f84a5

    • SHA512

      ee4f51afc51b04ca2a56125ebcb12f5233c1cb8e307963729560ce3e913ed531c042804fc0b40abdaa579ff1b6f9ad4b70a3c67e6c66595da62b5d327e1c7c66

    • SSDEEP

      12288:UZWtI6RkzweZJys73dOvXDpNjNe8mGOWweZJys73dOvXDpNjNe8m6ut:Uuha8eZJ8NI8weZJ8NI8U

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Sets file execution options in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Execution

System Services

1
T1569

Service Execution

1
T1569.002

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Modify Registry

2
T1112

Lateral Movement

Replication Through Removable Media

1
T1091

Impact

Service Stop

1
T1489

Tasks