General

  • Target

    6482062db317ebf960debced8491bf8e_JaffaCakes118

  • Size

    127KB

  • Sample

    240722-x9c7jsvbpq

  • MD5

    6482062db317ebf960debced8491bf8e

  • SHA1

    508ec51fed393e6f63c1cfa9ff94433394498066

  • SHA256

    025900ef14c50f6dbd931311895acd44fed67d3319590992fbfd40c36611e702

  • SHA512

    1cfa531945c61788b7f6c0dd45183f5304acbde0ccae81db6f7cf495525ac7c315fe8b4e7ef8d3f762fe79f343d1685bb3b042098e334442cf6a2206ce68447f

  • SSDEEP

    1536:pamlu3hbBGy3G8nhMpD7MUYU6U5jUdPQc+n35KZg8/nouy8Iu:preMPd/MYjUtQl78vout

Malware Config

Targets

    • Target

      6482062db317ebf960debced8491bf8e_JaffaCakes118

    • Size

      127KB

    • MD5

      6482062db317ebf960debced8491bf8e

    • SHA1

      508ec51fed393e6f63c1cfa9ff94433394498066

    • SHA256

      025900ef14c50f6dbd931311895acd44fed67d3319590992fbfd40c36611e702

    • SHA512

      1cfa531945c61788b7f6c0dd45183f5304acbde0ccae81db6f7cf495525ac7c315fe8b4e7ef8d3f762fe79f343d1685bb3b042098e334442cf6a2206ce68447f

    • SSDEEP

      1536:pamlu3hbBGy3G8nhMpD7MUYU6U5jUdPQc+n35KZg8/nouy8Iu:preMPd/MYjUtQl78vout

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables use of System Restore points

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks