General

  • Target

    488ad672fc35e7f3c46cd370e3dbcf22_JaffaCakes118

  • Size

    598KB

  • Sample

    240715-gvavwa1gmp

  • MD5

    488ad672fc35e7f3c46cd370e3dbcf22

  • SHA1

    62f92f73b836edcba4111ac1f87643886c309f3f

  • SHA256

    9b653379b22209a507286071ee29821e65a656df028f5d321b01220af2138664

  • SHA512

    a66fa5dc445fc185eea6109ca601149b955c333d36e0494df96da2db4999ea4ce644426b110d6f7a6ded259dea59316faf09a03b4a15773f6c7ded66b4b6d2ba

  • SSDEEP

    12288:gOnBtOB0vrgJlKZzIQlPi4u/RsGRiOig7yIX4qa:1BtOAkJsZe4upsU9ighja

Malware Config

Targets

    • Target

      488ad672fc35e7f3c46cd370e3dbcf22_JaffaCakes118

    • Size

      598KB

    • MD5

      488ad672fc35e7f3c46cd370e3dbcf22

    • SHA1

      62f92f73b836edcba4111ac1f87643886c309f3f

    • SHA256

      9b653379b22209a507286071ee29821e65a656df028f5d321b01220af2138664

    • SHA512

      a66fa5dc445fc185eea6109ca601149b955c333d36e0494df96da2db4999ea4ce644426b110d6f7a6ded259dea59316faf09a03b4a15773f6c7ded66b4b6d2ba

    • SSDEEP

      12288:gOnBtOB0vrgJlKZzIQlPi4u/RsGRiOig7yIX4qa:1BtOAkJsZe4upsU9ighja

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks