General

  • Target

    3131f57dfc1a398077f5739d109ed181_JaffaCakes118

  • Size

    290KB

  • Sample

    240709-vcaztavhqc

  • MD5

    3131f57dfc1a398077f5739d109ed181

  • SHA1

    a28cfc2248859de40b78c9be61794ed098b84af4

  • SHA256

    46a819b87669db5e5c2dff87dd8fe09edab930a43fc98270f4b357d559fca6a1

  • SHA512

    37e1ea1be0c9201f653eb760daff1fd69efe78d74c77626726ebcee90514120279d6480d0f2cb7a189b3ad504262d64a6f10d35fdc9673fc315ec35e61e4037e

  • SSDEEP

    6144:s/u/NGn9a3Ku42+uBIW0KzkWdoJts8RuSMSZGpYYW3Vsa:s/INm9KKuF+uihKz1dVKs6YWlsa

Malware Config

Targets

    • Target

      3131f57dfc1a398077f5739d109ed181_JaffaCakes118

    • Size

      290KB

    • MD5

      3131f57dfc1a398077f5739d109ed181

    • SHA1

      a28cfc2248859de40b78c9be61794ed098b84af4

    • SHA256

      46a819b87669db5e5c2dff87dd8fe09edab930a43fc98270f4b357d559fca6a1

    • SHA512

      37e1ea1be0c9201f653eb760daff1fd69efe78d74c77626726ebcee90514120279d6480d0f2cb7a189b3ad504262d64a6f10d35fdc9673fc315ec35e61e4037e

    • SSDEEP

      6144:s/u/NGn9a3Ku42+uBIW0KzkWdoJts8RuSMSZGpYYW3Vsa:s/INm9KKuF+uihKz1dVKs6YWlsa

    • Modifies firewall policy service

    • UAC bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks