General

  • Target

    7418ac8d9c17eafd9d8a23530a548a11_JaffaCakes118

  • Size

    31KB

  • Sample

    240726-pwkqgayarn

  • MD5

    7418ac8d9c17eafd9d8a23530a548a11

  • SHA1

    2f8bb96c0cdbda9c6af8ad6bd5e1c72c2a5d3902

  • SHA256

    e7bfb97997c6e9afbd11c0be8cf7bae3d6285239ec1b9d3a8aea2e8ef59a2f0a

  • SHA512

    f56c9c17f7218cc419bd21e9f8989aa6a54cadfedaf5f22fe15b510965e088fc601a6284eed835db4a860e6529f1542c586d60ee8c7c04e40e33577005207224

  • SSDEEP

    768:hrdh4gRPdt3QW2Fx1Zk+7j0ynwnbcuyD7UZug:hrdl2n1KIxwnouy8cg

Malware Config

Targets

    • Target

      7418ac8d9c17eafd9d8a23530a548a11_JaffaCakes118

    • Size

      31KB

    • MD5

      7418ac8d9c17eafd9d8a23530a548a11

    • SHA1

      2f8bb96c0cdbda9c6af8ad6bd5e1c72c2a5d3902

    • SHA256

      e7bfb97997c6e9afbd11c0be8cf7bae3d6285239ec1b9d3a8aea2e8ef59a2f0a

    • SHA512

      f56c9c17f7218cc419bd21e9f8989aa6a54cadfedaf5f22fe15b510965e088fc601a6284eed835db4a860e6529f1542c586d60ee8c7c04e40e33577005207224

    • SSDEEP

      768:hrdh4gRPdt3QW2Fx1Zk+7j0ynwnbcuyD7UZug:hrdl2n1KIxwnouy8cg

    • UAC bypass

    • Stops running service(s)

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks