General

  • Target

    bca30eefcb5bea30ed99d3c5ab3e860a_JaffaCakes118

  • Size

    853KB

  • Sample

    240618-srj5xstcrm

  • MD5

    bca30eefcb5bea30ed99d3c5ab3e860a

  • SHA1

    a19ae4814522516606878d194ea6ed02fa53f376

  • SHA256

    a1ff7b2383440ff9c7a5069ac72f26001a589a40ab749fb2ebb80514df7a8459

  • SHA512

    c277514e1faa5038fff88bcdf873251f3aba33e56ba046177186b4135571488629cfb734cb0beec6c7c06796f33f3844c9c9b3337cfb2fcad56e7032c0a71749

  • SSDEEP

    12288:C7fM4Z0G50HCCKCaUdZDc0Ix8tO1XoDeTkfkn+zpym0IFkll5OCp+nN0lYFCurdu:CgKdBaG0cv1XcOksWpIlF+N0lr00yiz

Malware Config

Targets

    • Target

      bca30eefcb5bea30ed99d3c5ab3e860a_JaffaCakes118

    • Size

      853KB

    • MD5

      bca30eefcb5bea30ed99d3c5ab3e860a

    • SHA1

      a19ae4814522516606878d194ea6ed02fa53f376

    • SHA256

      a1ff7b2383440ff9c7a5069ac72f26001a589a40ab749fb2ebb80514df7a8459

    • SHA512

      c277514e1faa5038fff88bcdf873251f3aba33e56ba046177186b4135571488629cfb734cb0beec6c7c06796f33f3844c9c9b3337cfb2fcad56e7032c0a71749

    • SSDEEP

      12288:C7fM4Z0G50HCCKCaUdZDc0Ix8tO1XoDeTkfkn+zpym0IFkll5OCp+nN0lYFCurdu:CgKdBaG0cv1XcOksWpIlF+N0lr00yiz

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Privilege Escalation

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks