General

  • Target

    2be4e2682664dcd7f69dfcd0ee87294a_JaffaCakes118

  • Size

    518KB

  • Sample

    240708-lxx6eawcne

  • MD5

    2be4e2682664dcd7f69dfcd0ee87294a

  • SHA1

    c6f689bf188455111dce37f6d09734affd3bb29e

  • SHA256

    d8f9ab99b7e41e02833a9f9fdebb6db6d9cd2e6e5a5fca2c6f6432cac6c2d0ff

  • SHA512

    02261dd559544735bb94d7ee524babeaabed514225b630ef96ba13301926fdb6246f0958993a31eff8f3f75802ecc0e5c4a8138e36ffc9c3f616163901a7efc3

  • SSDEEP

    6144:5uHOtB0rG1VVE+IaGFrQZb++tdsHP4+QfI6Uw:gOtBwuZerQZb+md4w1Uw

Malware Config

Targets

    • Target

      2be4e2682664dcd7f69dfcd0ee87294a_JaffaCakes118

    • Size

      518KB

    • MD5

      2be4e2682664dcd7f69dfcd0ee87294a

    • SHA1

      c6f689bf188455111dce37f6d09734affd3bb29e

    • SHA256

      d8f9ab99b7e41e02833a9f9fdebb6db6d9cd2e6e5a5fca2c6f6432cac6c2d0ff

    • SHA512

      02261dd559544735bb94d7ee524babeaabed514225b630ef96ba13301926fdb6246f0958993a31eff8f3f75802ecc0e5c4a8138e36ffc9c3f616163901a7efc3

    • SSDEEP

      6144:5uHOtB0rG1VVE+IaGFrQZb++tdsHP4+QfI6Uw:gOtBwuZerQZb+md4w1Uw

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks