General

  • Target

    00143c4efc9fd6caf4234ca9e9f8c889_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240619-xqgqmaxdlg

  • MD5

    00143c4efc9fd6caf4234ca9e9f8c889

  • SHA1

    012a45f779d56471946f922d2f82db875e30190d

  • SHA256

    96768dfb124ca3fb452d7b273109c75e81961204f1961ebf68c0da0e9a05c5fd

  • SHA512

    fb3b506df1e66b6abd1acee6362d94c0ec7677258b1d4722fa1625831584134795b1b0fb89caf05afa05c787b5b3951592b6e614da6ee2e711225e0e28c0e6b4

  • SSDEEP

    384:iidD9d6GACjAxbit89hYwx3KbjSC+CuEL1zOe8xNNnKy:jLiOYYu0STCDpOe8lP

Malware Config

Targets

    • Target

      00143c4efc9fd6caf4234ca9e9f8c889_JaffaCakes118

    • Size

      2.0MB

    • MD5

      00143c4efc9fd6caf4234ca9e9f8c889

    • SHA1

      012a45f779d56471946f922d2f82db875e30190d

    • SHA256

      96768dfb124ca3fb452d7b273109c75e81961204f1961ebf68c0da0e9a05c5fd

    • SHA512

      fb3b506df1e66b6abd1acee6362d94c0ec7677258b1d4722fa1625831584134795b1b0fb89caf05afa05c787b5b3951592b6e614da6ee2e711225e0e28c0e6b4

    • SSDEEP

      384:iidD9d6GACjAxbit89hYwx3KbjSC+CuEL1zOe8xNNnKy:jLiOYYu0STCDpOe8lP

    • Modifies firewall policy service

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks