General

  • Target

    5adf21976d3c49d7fd2b0b0ddbe52a27_JaffaCakes118

  • Size

    436KB

  • Sample

    240719-hkhneaxdrl

  • MD5

    5adf21976d3c49d7fd2b0b0ddbe52a27

  • SHA1

    0e601134fd4321afdf31fba580ad557477541357

  • SHA256

    f2321cad844ffee42e1d9637697642b6b0d4793dded1edbd794bc310ba54953f

  • SHA512

    643c7a16ac7615f03927eba968b2566b010e972b0944126b826daadc4ae6317494ca3984b938a32ebaa01fa44bbc74c23896912d74100d0f793493ceed933833

  • SSDEEP

    12288:poQQQRzVfElEGAiNtNy9Ktg7Sbcd+aP/EuPiF+KAA:poQQQRzViNg7MKP/EuA+KN

Malware Config

Targets

    • Target

      5adf21976d3c49d7fd2b0b0ddbe52a27_JaffaCakes118

    • Size

      436KB

    • MD5

      5adf21976d3c49d7fd2b0b0ddbe52a27

    • SHA1

      0e601134fd4321afdf31fba580ad557477541357

    • SHA256

      f2321cad844ffee42e1d9637697642b6b0d4793dded1edbd794bc310ba54953f

    • SHA512

      643c7a16ac7615f03927eba968b2566b010e972b0944126b826daadc4ae6317494ca3984b938a32ebaa01fa44bbc74c23896912d74100d0f793493ceed933833

    • SSDEEP

      12288:poQQQRzVfElEGAiNtNy9Ktg7Sbcd+aP/EuPiF+KAA:poQQQRzViNg7MKP/EuA+KN

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks