General

  • Target

    65aad498abceb9b5391005519dbcd631_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240522-csptsshd6v

  • MD5

    65aad498abceb9b5391005519dbcd631

  • SHA1

    b27ce733009b7fed6291f0020646adae63e58a60

  • SHA256

    5ec37ed8e608838780dc8326a7e329069af7d5d1f6220a085174cc59b4587219

  • SHA512

    81bc0908ff89b316fefdde39c737661ae8342bf4a94934c9f9561dd77a0fdbe0fca541f098398c1c3a6fac8d7524d9593705c6af1b7771f6393980799d9bf180

  • SSDEEP

    12288:UZWtI6RkPKuMGOtKuMGOtKuMGOtKuMGOtKuMWR:UuhaDR

Malware Config

Targets

    • Target

      65aad498abceb9b5391005519dbcd631_JaffaCakes118

    • Size

      1.3MB

    • MD5

      65aad498abceb9b5391005519dbcd631

    • SHA1

      b27ce733009b7fed6291f0020646adae63e58a60

    • SHA256

      5ec37ed8e608838780dc8326a7e329069af7d5d1f6220a085174cc59b4587219

    • SHA512

      81bc0908ff89b316fefdde39c737661ae8342bf4a94934c9f9561dd77a0fdbe0fca541f098398c1c3a6fac8d7524d9593705c6af1b7771f6393980799d9bf180

    • SSDEEP

      12288:UZWtI6RkPKuMGOtKuMGOtKuMGOtKuMGOtKuMWR:UuhaDR

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Sets file execution options in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks