General

  • Target

    2e6c08f18be4f55ed7a56e174aaf0bc7_JaffaCakes118

  • Size

    180KB

  • Sample

    240709-a481pszela

  • MD5

    2e6c08f18be4f55ed7a56e174aaf0bc7

  • SHA1

    fd81a7be7d6fa6d16124ef57f40daa5c06d90c6a

  • SHA256

    b6756c38879940dcaab2fb318688d18a72e32e15419105392cb29157d03782fb

  • SHA512

    66fd42009908c1ae7cae9da1104e70de8154b0327fabbf99b95f55b8a29b210341ac04ee20e34eea27a8be2af77db1b5bfb6a3d1f04f7913f143dbc7bcf0629c

  • SSDEEP

    3072:TdVd2Hayox1aMVBjNa9+9rtVnmywjg48RZ00RZ0/:5uHOtBsQnmy+g4n

Malware Config

Targets

    • Target

      2e6c08f18be4f55ed7a56e174aaf0bc7_JaffaCakes118

    • Size

      180KB

    • MD5

      2e6c08f18be4f55ed7a56e174aaf0bc7

    • SHA1

      fd81a7be7d6fa6d16124ef57f40daa5c06d90c6a

    • SHA256

      b6756c38879940dcaab2fb318688d18a72e32e15419105392cb29157d03782fb

    • SHA512

      66fd42009908c1ae7cae9da1104e70de8154b0327fabbf99b95f55b8a29b210341ac04ee20e34eea27a8be2af77db1b5bfb6a3d1f04f7913f143dbc7bcf0629c

    • SSDEEP

      3072:TdVd2Hayox1aMVBjNa9+9rtVnmywjg48RZ00RZ0/:5uHOtBsQnmy+g4n

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks