General

  • Target

    8e27c1ac94071c342d11b189f9124581_JaffaCakes118

  • Size

    419KB

  • Sample

    240812-k57jdavalr

  • MD5

    8e27c1ac94071c342d11b189f9124581

  • SHA1

    4d4d28419d49ada8701e05132d3b1ada2797a9d7

  • SHA256

    c66317a2d686edc86ec0dfb9d54a33b944de93930f13e34f120b27ce36168113

  • SHA512

    675bf92237d5492b9164a0dd899c124341a316019423e93f9976dafd69185825b43dd3176a9a9302497227736885a83a27ddb93edf1225321c166e3443c0e5f1

  • SSDEEP

    6144:5uHOJrG1VVE+Iel+lXDZJfLufs73dOk0XDpNjNOpys8E/UOPSe570Szp3irG1VV8:gO9ureZJys73dOvXDpNjNe8TOB0JuV4

Malware Config

Targets

    • Target

      8e27c1ac94071c342d11b189f9124581_JaffaCakes118

    • Size

      419KB

    • MD5

      8e27c1ac94071c342d11b189f9124581

    • SHA1

      4d4d28419d49ada8701e05132d3b1ada2797a9d7

    • SHA256

      c66317a2d686edc86ec0dfb9d54a33b944de93930f13e34f120b27ce36168113

    • SHA512

      675bf92237d5492b9164a0dd899c124341a316019423e93f9976dafd69185825b43dd3176a9a9302497227736885a83a27ddb93edf1225321c166e3443c0e5f1

    • SSDEEP

      6144:5uHOJrG1VVE+Iel+lXDZJfLufs73dOk0XDpNjNOpys8E/UOPSe570Szp3irG1VV8:gO9ureZJys73dOvXDpNjNe8TOB0JuV4

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks