General

  • Target

    84cb7f128806b3f7b09085ffc83094b2_JaffaCakes118

  • Size

    99KB

  • Sample

    240810-e2l6dawblr

  • MD5

    84cb7f128806b3f7b09085ffc83094b2

  • SHA1

    d42d414b9b4f3a159dbb878d43fdb3b468bc2fb2

  • SHA256

    98a928cc358236e3badfa5b62284693c89672db060068bc95831ab30b19b14af

  • SHA512

    fc6446166926f7bc8b6ea57a7f2037d038804b5288cc2c2e5cdf1db3458cdf2849485e1c1fe37c7ad0d9396ce507d2a01081ad508e02cfd13485406c9dfe537f

  • SSDEEP

    3072:QFON0ezH86SeaYJc1m0EY1YJWofYRxYv0s3pMU4HZl:CO3X9n0I3h4H

Malware Config

Targets

    • Target

      84cb7f128806b3f7b09085ffc83094b2_JaffaCakes118

    • Size

      99KB

    • MD5

      84cb7f128806b3f7b09085ffc83094b2

    • SHA1

      d42d414b9b4f3a159dbb878d43fdb3b468bc2fb2

    • SHA256

      98a928cc358236e3badfa5b62284693c89672db060068bc95831ab30b19b14af

    • SHA512

      fc6446166926f7bc8b6ea57a7f2037d038804b5288cc2c2e5cdf1db3458cdf2849485e1c1fe37c7ad0d9396ce507d2a01081ad508e02cfd13485406c9dfe537f

    • SSDEEP

      3072:QFON0ezH86SeaYJc1m0EY1YJWofYRxYv0s3pMU4HZl:CO3X9n0I3h4H

    • Modifies WinLogon for persistence

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks