General

  • Target

    7b64f943dd4c0922baf34d73dc673cb2_JaffaCakes118

  • Size

    262KB

  • Sample

    240731-f1mwyssglg

  • MD5

    7b64f943dd4c0922baf34d73dc673cb2

  • SHA1

    52f2e206f85e0184f24ae3225bbf9493d6dd5dfc

  • SHA256

    f706eee356d07bade5c477067e579804ba32f3e28472999a8742d12af45d28a2

  • SHA512

    e60fa8ef0933279a2c925c1316c60626d5a8dc8bf3822593277727fa7172f01367bab1331e0f8be19089da0bb9d17054996b0ad1b81fc57480bde2e6247af36a

  • SSDEEP

    6144:/58Gp+df0afmVTRMdbdpn94sLrNXel9Bb98+MAt/:B8YkfXf4TRMl94svNuzBb9Zr

Malware Config

Targets

    • Target

      7b64f943dd4c0922baf34d73dc673cb2_JaffaCakes118

    • Size

      262KB

    • MD5

      7b64f943dd4c0922baf34d73dc673cb2

    • SHA1

      52f2e206f85e0184f24ae3225bbf9493d6dd5dfc

    • SHA256

      f706eee356d07bade5c477067e579804ba32f3e28472999a8742d12af45d28a2

    • SHA512

      e60fa8ef0933279a2c925c1316c60626d5a8dc8bf3822593277727fa7172f01367bab1331e0f8be19089da0bb9d17054996b0ad1b81fc57480bde2e6247af36a

    • SSDEEP

      6144:/58Gp+df0afmVTRMdbdpn94sLrNXel9Bb98+MAt/:B8YkfXf4TRMl94svNuzBb9Zr

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Tasks