General

  • Target

    7544126164d5f44bb49b7b38f97a5db2_JaffaCakes118

  • Size

    1.0MB

  • Sample

    240726-xdq4ja1arc

  • MD5

    7544126164d5f44bb49b7b38f97a5db2

  • SHA1

    57890e9c73f1e1bcfc6d442bb8d58032424cd647

  • SHA256

    cf050a29e9b608a4b80fbdf07a5065473faf13165f6e37c83a0677c58ee2067d

  • SHA512

    7138a08156b6c56a35b1f405e03c1c2e43b6e997854612eb80cef67c4833277bbf7c79faf0a0562b4a5b5239920a0c0a5f1407c9154a5b7803d3c405fccc855b

  • SSDEEP

    6144:GWZfec9EbXDk6RkQKVrG1VVE+IRuHOGrG1VVE+IYrG1VVE+ItuHO5rG1VVE+IRuw:3ZWtI6Rkru9O6uHuVONu9O6uHuVONu94

Malware Config

Targets

    • Target

      7544126164d5f44bb49b7b38f97a5db2_JaffaCakes118

    • Size

      1.0MB

    • MD5

      7544126164d5f44bb49b7b38f97a5db2

    • SHA1

      57890e9c73f1e1bcfc6d442bb8d58032424cd647

    • SHA256

      cf050a29e9b608a4b80fbdf07a5065473faf13165f6e37c83a0677c58ee2067d

    • SHA512

      7138a08156b6c56a35b1f405e03c1c2e43b6e997854612eb80cef67c4833277bbf7c79faf0a0562b4a5b5239920a0c0a5f1407c9154a5b7803d3c405fccc855b

    • SSDEEP

      6144:GWZfec9EbXDk6RkQKVrG1VVE+IRuHOGrG1VVE+IYrG1VVE+ItuHO5rG1VVE+IRuw:3ZWtI6Rkru9O6uHuVONu9O6uHuVONu94

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks