General

  • Target

    357a71bc43621cd13d8019d8eab8321e_JaffaCakes118

  • Size

    147KB

  • Sample

    240710-ttdllaxejj

  • MD5

    357a71bc43621cd13d8019d8eab8321e

  • SHA1

    7ba961decbab63775e375fe476d2678caebee4fd

  • SHA256

    c05aaf0cb3982fac7c2fc589bc9504e1ad660294a5bf2a9e3b9b2717416c8602

  • SHA512

    6943b1aca8fd0c93a787ec8b3e781984436f1463cc3e7dde81667666569cb66b9b896b255553eee36c7bc82fabeb900fbb89fcbd1c7950d64accc5ffc2cc1846

  • SSDEEP

    3072:tOCn1rixFxB2MtsHQvjcPs1+nKYkdoqrhyK4gPVQDr9IF2q27iR1+aJe1mgawzx+:tOCn1rifm+sujcPsInKTtPVQGF2q2OR5

Malware Config

Targets

    • Target

      357a71bc43621cd13d8019d8eab8321e_JaffaCakes118

    • Size

      147KB

    • MD5

      357a71bc43621cd13d8019d8eab8321e

    • SHA1

      7ba961decbab63775e375fe476d2678caebee4fd

    • SHA256

      c05aaf0cb3982fac7c2fc589bc9504e1ad660294a5bf2a9e3b9b2717416c8602

    • SHA512

      6943b1aca8fd0c93a787ec8b3e781984436f1463cc3e7dde81667666569cb66b9b896b255553eee36c7bc82fabeb900fbb89fcbd1c7950d64accc5ffc2cc1846

    • SSDEEP

      3072:tOCn1rixFxB2MtsHQvjcPs1+nKYkdoqrhyK4gPVQDr9IF2q27iR1+aJe1mgawzx+:tOCn1rifm+sujcPsInKTtPVQGF2q2OR5

    • Drops file in Drivers directory

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks