General

  • Target

    bc1e3742d8dc2b985230629bac9d76c3_JaffaCakes118

  • Size

    874KB

  • Sample

    240618-qgca8aygpn

  • MD5

    bc1e3742d8dc2b985230629bac9d76c3

  • SHA1

    6dad1a2077ccbdd65d05f1cc3d7754c98bdf2abe

  • SHA256

    bc00ccf0ff1cd0b8157ba64d926f9fb34712f5ce99bf6e5c87e69000a9ce2866

  • SHA512

    573c35f1a6848372fce4a5bcd708d5e163d7dfb64edf30bdad69fbe63cab7ef377ba1b65c03cbf7bafd3975a211f8426dbaebcc9f8e04c5831212dee2061cce1

  • SSDEEP

    24576:/n5ToFvX3VvH+S4cvtN2gVUdeX0OjuoFdqz4tSG9E2gH7l:/n5EdV/+S4m72gVxVjuU9N9Efbl

Malware Config

Targets

    • Target

      bc1e3742d8dc2b985230629bac9d76c3_JaffaCakes118

    • Size

      874KB

    • MD5

      bc1e3742d8dc2b985230629bac9d76c3

    • SHA1

      6dad1a2077ccbdd65d05f1cc3d7754c98bdf2abe

    • SHA256

      bc00ccf0ff1cd0b8157ba64d926f9fb34712f5ce99bf6e5c87e69000a9ce2866

    • SHA512

      573c35f1a6848372fce4a5bcd708d5e163d7dfb64edf30bdad69fbe63cab7ef377ba1b65c03cbf7bafd3975a211f8426dbaebcc9f8e04c5831212dee2061cce1

    • SSDEEP

      24576:/n5ToFvX3VvH+S4cvtN2gVUdeX0OjuoFdqz4tSG9E2gH7l:/n5EdV/+S4m72gVxVjuU9N9Efbl

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Privilege Escalation

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks