General

  • Target

    4bab5be2ced099080b81fb33ae4c64b8_JaffaCakes118

  • Size

    208KB

  • Sample

    240715-2b9kbasdnk

  • MD5

    4bab5be2ced099080b81fb33ae4c64b8

  • SHA1

    59195b5f86a05bfd7bf78acfc04307cdcbe06ead

  • SHA256

    445557d23581225127de60121818a55f61887329669c769e4a155868fffb1112

  • SHA512

    dea4e69c966ca2f2253a558892c28fdc1f7d9b93c76c88fb6b3ea20b99f2437744d84d543a5042cb4b2659623b22739968b349e31d93cc304318a1852a426927

  • SSDEEP

    6144:MLa94GN7fiIEAeLHJx0GZ18n7tHOzz8NUY1uQ6FA1CBBpBeagzaWxUm9:MW94GN7fiIEAeLHJx0GZenpuX1Y1uzF2

Malware Config

Targets

    • Target

      4bab5be2ced099080b81fb33ae4c64b8_JaffaCakes118

    • Size

      208KB

    • MD5

      4bab5be2ced099080b81fb33ae4c64b8

    • SHA1

      59195b5f86a05bfd7bf78acfc04307cdcbe06ead

    • SHA256

      445557d23581225127de60121818a55f61887329669c769e4a155868fffb1112

    • SHA512

      dea4e69c966ca2f2253a558892c28fdc1f7d9b93c76c88fb6b3ea20b99f2437744d84d543a5042cb4b2659623b22739968b349e31d93cc304318a1852a426927

    • SSDEEP

      6144:MLa94GN7fiIEAeLHJx0GZ18n7tHOzz8NUY1uQ6FA1CBBpBeagzaWxUm9:MW94GN7fiIEAeLHJx0GZenpuX1Y1uzF2

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks