General

  • Target

    bbfd0f507c37756c7dc6df7910fdef21_JaffaCakes118

  • Size

    895KB

  • Sample

    240618-pxbtysteqb

  • MD5

    bbfd0f507c37756c7dc6df7910fdef21

  • SHA1

    7151287181e900cfbdc7a30595c6fdb0e20f1aa4

  • SHA256

    fc309c0345cbe43c2f53bc259f9b58ce0d710dbe53012412b868eea2ce58d46c

  • SHA512

    8f0e495e8fbd5846aa0ff063d73a9cc0befde90f61e9e732cd3c16cbb5b35298648e61ec99c74786d09232dfe0badb2925d8810b6714cf962cad10de0c9b3e3e

  • SSDEEP

    12288:89SnVA6nHEY6oalKPZfgkGvwtPQOrK1KG5yB2o70pllkym5YMJ+OSWGOjG0TKsJI:8Sd6/lhvitK1Kl4kn6MtgMD+f+t1VQtL

Malware Config

Targets

    • Target

      bbfd0f507c37756c7dc6df7910fdef21_JaffaCakes118

    • Size

      895KB

    • MD5

      bbfd0f507c37756c7dc6df7910fdef21

    • SHA1

      7151287181e900cfbdc7a30595c6fdb0e20f1aa4

    • SHA256

      fc309c0345cbe43c2f53bc259f9b58ce0d710dbe53012412b868eea2ce58d46c

    • SHA512

      8f0e495e8fbd5846aa0ff063d73a9cc0befde90f61e9e732cd3c16cbb5b35298648e61ec99c74786d09232dfe0badb2925d8810b6714cf962cad10de0c9b3e3e

    • SSDEEP

      12288:89SnVA6nHEY6oalKPZfgkGvwtPQOrK1KG5yB2o70pllkym5YMJ+OSWGOjG0TKsJI:8Sd6/lhvitK1Kl4kn6MtgMD+f+t1VQtL

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Privilege Escalation

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks