General

  • Target

    084662ef21668e6d11e4ab2b59471f11_JaffaCakes118

  • Size

    414KB

  • Sample

    240624-np26hatcpk

  • MD5

    084662ef21668e6d11e4ab2b59471f11

  • SHA1

    cac7d6e7c557fda441e1573dcb5634d218854746

  • SHA256

    ec08f4f4c345b690e228cc7f93f3488cfd5d62906c90c7d0d887d942c253ed29

  • SHA512

    417bb394132c3dc3b90b1b51682ea9d31f484e446eb1333e5fb8e7777558cfc1675ee0712c954daa668d80549f7666ebfdb60cb6d98b7cf1bc20c33392cb2880

  • SSDEEP

    6144:iARb+1YFc8CnFu73mBCR7NFrkcrreoSi7CL+PqL55NjeqE5:9b+1F8C+minkSrfSi+L/V5Nj

Score
10/10

Malware Config

Targets

    • Target

      084662ef21668e6d11e4ab2b59471f11_JaffaCakes118

    • Size

      414KB

    • MD5

      084662ef21668e6d11e4ab2b59471f11

    • SHA1

      cac7d6e7c557fda441e1573dcb5634d218854746

    • SHA256

      ec08f4f4c345b690e228cc7f93f3488cfd5d62906c90c7d0d887d942c253ed29

    • SHA512

      417bb394132c3dc3b90b1b51682ea9d31f484e446eb1333e5fb8e7777558cfc1675ee0712c954daa668d80549f7666ebfdb60cb6d98b7cf1bc20c33392cb2880

    • SSDEEP

      6144:iARb+1YFc8CnFu73mBCR7NFrkcrreoSi7CL+PqL55NjeqE5:9b+1F8C+minkSrfSi+L/V5Nj

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies security service

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks