General

  • Target

    84af2ab703050f1cec176535a9c5d12e_JaffaCakes118

  • Size

    31KB

  • Sample

    240810-ea4aksvakn

  • MD5

    84af2ab703050f1cec176535a9c5d12e

  • SHA1

    2a31814559d5480961dd7627df8e239672e7b68e

  • SHA256

    5c0f93efb52051a3937a738c1fd8ae68b7f3c869cc1ffefc1b4c9fcc4a66c168

  • SHA512

    90e554a426ba0a7f17708800db8eef6dcd4b1762bb620c40396303dabbf4e41799bd868691f9eb5607b49f3998ecbdb85f7f3872c41cb82453ab94428f64ea98

  • SSDEEP

    768:uSb7BvPZF1z3Bl4Hyyc8KB5Yg8yvepyq:bHtTJ3BlKg8KOAwX

Malware Config

Targets

    • Target

      84af2ab703050f1cec176535a9c5d12e_JaffaCakes118

    • Size

      31KB

    • MD5

      84af2ab703050f1cec176535a9c5d12e

    • SHA1

      2a31814559d5480961dd7627df8e239672e7b68e

    • SHA256

      5c0f93efb52051a3937a738c1fd8ae68b7f3c869cc1ffefc1b4c9fcc4a66c168

    • SHA512

      90e554a426ba0a7f17708800db8eef6dcd4b1762bb620c40396303dabbf4e41799bd868691f9eb5607b49f3998ecbdb85f7f3872c41cb82453ab94428f64ea98

    • SSDEEP

      768:uSb7BvPZF1z3Bl4Hyyc8KB5Yg8yvepyq:bHtTJ3BlKg8KOAwX

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks