General

  • Target

    4d456ff14b2206acf5335bec1a4e6d37_JaffaCakes118

  • Size

    2.7MB

  • Sample

    240716-hx7s3atamh

  • MD5

    4d456ff14b2206acf5335bec1a4e6d37

  • SHA1

    11e5b1b1b3e56715ca2b031c8338d366074e2bfd

  • SHA256

    0ee681e145b0352002c1ade7c1edbe8eb1330d134e57cec27842afd1ff0b3cc3

  • SHA512

    32c2ed948e008d843e8ce50921c582e5c43d9c4add1fa4d457690f995d18dff77500ca1dee9645b281c44d89206962b7ee125c2391e4d24c873c929f659e6f36

  • SSDEEP

    49152:c8a8pojV8a8pojV8a8pojV8a8pojV8a8pojtB:K

Malware Config

Targets

    • Target

      4d456ff14b2206acf5335bec1a4e6d37_JaffaCakes118

    • Size

      2.7MB

    • MD5

      4d456ff14b2206acf5335bec1a4e6d37

    • SHA1

      11e5b1b1b3e56715ca2b031c8338d366074e2bfd

    • SHA256

      0ee681e145b0352002c1ade7c1edbe8eb1330d134e57cec27842afd1ff0b3cc3

    • SHA512

      32c2ed948e008d843e8ce50921c582e5c43d9c4add1fa4d457690f995d18dff77500ca1dee9645b281c44d89206962b7ee125c2391e4d24c873c929f659e6f36

    • SSDEEP

      49152:c8a8pojV8a8pojV8a8pojV8a8pojV8a8pojtB:K

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks