General

  • Target

    8c9e59f7f214ae5ab48094dad59fa2e5_JaffaCakes118

  • Size

    636KB

  • Sample

    240812-aw8d7swhkj

  • MD5

    8c9e59f7f214ae5ab48094dad59fa2e5

  • SHA1

    d46e754ef2053d3d046e97a03f1386cbd61d5abe

  • SHA256

    6ae022c905021b7b170da0f3d5db0578bfeda8e0ebc0e22678182b69ad63ea66

  • SHA512

    d8c6fc44c6c034f33781b6212b9e784cb2812f5b391c8715500866a9721353e46b257ba7ab624c004e96871cea8ecd0c3afeee4b24b96526659fcde9bff3c8c6

  • SSDEEP

    12288:nQf1UPRMF7oi/7T8okTcRpykkVUXeXmLmoYa9ILWPQ7MKrsX+:quPRMFvb3p9kVM2mKoBILWPQ7M+su

Malware Config

Targets

    • Target

      8c9e59f7f214ae5ab48094dad59fa2e5_JaffaCakes118

    • Size

      636KB

    • MD5

      8c9e59f7f214ae5ab48094dad59fa2e5

    • SHA1

      d46e754ef2053d3d046e97a03f1386cbd61d5abe

    • SHA256

      6ae022c905021b7b170da0f3d5db0578bfeda8e0ebc0e22678182b69ad63ea66

    • SHA512

      d8c6fc44c6c034f33781b6212b9e784cb2812f5b391c8715500866a9721353e46b257ba7ab624c004e96871cea8ecd0c3afeee4b24b96526659fcde9bff3c8c6

    • SSDEEP

      12288:nQf1UPRMF7oi/7T8okTcRpykkVUXeXmLmoYa9ILWPQ7MKrsX+:quPRMFvb3p9kVM2mKoBILWPQ7M+su

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks