General

  • Target

    1675233f6597992bec841829642fe43f_JaffaCakes118

  • Size

    754KB

  • Sample

    240627-shj4kayhpj

  • MD5

    1675233f6597992bec841829642fe43f

  • SHA1

    6f0a48f364bfa7036fd4a8172b61678d8b776dbe

  • SHA256

    8541f6490a70761ad98fc75a9bce261f372995b632aebb6375364ed381ab4c5f

  • SHA512

    9c1797ee198148600702ca0d2059743d028a0c27e3f97d28dbb6e4cab0f9d605db82a12d2979abe750bf3bfd8db9208203ff178592b9220be74fb7491f373e48

  • SSDEEP

    12288:3ZWtI6RkWeZJys73dOvXDpNjNe8Nu0uJqQZy5SfOROv:3uhaWeZJ8NI8gJqsaS2ROv

Malware Config

Targets

    • Target

      1675233f6597992bec841829642fe43f_JaffaCakes118

    • Size

      754KB

    • MD5

      1675233f6597992bec841829642fe43f

    • SHA1

      6f0a48f364bfa7036fd4a8172b61678d8b776dbe

    • SHA256

      8541f6490a70761ad98fc75a9bce261f372995b632aebb6375364ed381ab4c5f

    • SHA512

      9c1797ee198148600702ca0d2059743d028a0c27e3f97d28dbb6e4cab0f9d605db82a12d2979abe750bf3bfd8db9208203ff178592b9220be74fb7491f373e48

    • SSDEEP

      12288:3ZWtI6RkWeZJys73dOvXDpNjNe8Nu0uJqQZy5SfOROv:3uhaWeZJ8NI8gJqsaS2ROv

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks