General

  • Target

    411a4a7d91a470f004c1d785320e9753_JaffaCakes118

  • Size

    29KB

  • Sample

    240713-ldpd6axeld

  • MD5

    411a4a7d91a470f004c1d785320e9753

  • SHA1

    75e39c62e04fa6a97ea54794b4d3f9c24cc61ebd

  • SHA256

    0b24337084608878194c71a3dbf40a06e457b61fad024dd2fb0bfb6ad571073c

  • SHA512

    00f44891cda68af23010349568fb2b59150626a352b9e6cd6a2ee02f78ff25a0afdc2aa18679ed44aa288e980cfd4fdba2e743a58157876094dcd03759875f7f

  • SSDEEP

    768:tQbuQRy2UjmUndnlTttxDn+3jiSkjRY6AB7kKfYoJ+ifBEewj:QuQRylaUDTDxDXjy6AB7koYy23

Malware Config

Targets

    • Target

      411a4a7d91a470f004c1d785320e9753_JaffaCakes118

    • Size

      29KB

    • MD5

      411a4a7d91a470f004c1d785320e9753

    • SHA1

      75e39c62e04fa6a97ea54794b4d3f9c24cc61ebd

    • SHA256

      0b24337084608878194c71a3dbf40a06e457b61fad024dd2fb0bfb6ad571073c

    • SHA512

      00f44891cda68af23010349568fb2b59150626a352b9e6cd6a2ee02f78ff25a0afdc2aa18679ed44aa288e980cfd4fdba2e743a58157876094dcd03759875f7f

    • SSDEEP

      768:tQbuQRy2UjmUndnlTttxDn+3jiSkjRY6AB7kKfYoJ+ifBEewj:QuQRylaUDTDxDXjy6AB7koYy23

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Modifies WinLogon

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks