General

  • Target

    293ad774aa38d3ba48d1a743ec24e24e_JaffaCakes118

  • Size

    29KB

  • Sample

    240706-xec83ascpa

  • MD5

    293ad774aa38d3ba48d1a743ec24e24e

  • SHA1

    ab3b9025b003c50103f113c6179c0afb082ed2b5

  • SHA256

    7d21843d3f252a6c5ea3a9039ef9e3ef6413961e3af044ee96158629122b91ef

  • SHA512

    fb513e0f87703515e9ecdea486fc53d333ea40041d9aaf0e5e574801dd34a03a17f666ce73bc43fea22ac1e6acae3ce0b7e548127789d2aba610f2491cf214ee

  • SSDEEP

    768:OcKfvd2nmL3F78hqauHB+6EBgxnbcuyD7Uqu6:gUny7ZnHZEBqnouy8p6

Malware Config

Targets

    • Target

      293ad774aa38d3ba48d1a743ec24e24e_JaffaCakes118

    • Size

      29KB

    • MD5

      293ad774aa38d3ba48d1a743ec24e24e

    • SHA1

      ab3b9025b003c50103f113c6179c0afb082ed2b5

    • SHA256

      7d21843d3f252a6c5ea3a9039ef9e3ef6413961e3af044ee96158629122b91ef

    • SHA512

      fb513e0f87703515e9ecdea486fc53d333ea40041d9aaf0e5e574801dd34a03a17f666ce73bc43fea22ac1e6acae3ce0b7e548127789d2aba610f2491cf214ee

    • SSDEEP

      768:OcKfvd2nmL3F78hqauHB+6EBgxnbcuyD7Uqu6:gUny7ZnHZEBqnouy8p6

    • UAC bypass

    • Stops running service(s)

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks