General

  • Target

    93fc71c7abef0a2fb2f0a618a1d18139_JaffaCakes118

  • Size

    339KB

  • Sample

    240813-vpvjzs1blj

  • MD5

    93fc71c7abef0a2fb2f0a618a1d18139

  • SHA1

    36588c85f2293993475b345fe85be8c02f6bd7f9

  • SHA256

    e03d8ab413dde35119ddf1454abe9b56b624c8979435c7bc5e63e2001c02d82c

  • SHA512

    9156254fe37533c7ca442e8afb3d62e19c1695ffc94b8653180f8a0e1780bf8e57b28cec8f4236da7f23501ce240c50da162fa4e45ed5e02e2098734c0ec97eb

  • SSDEEP

    6144:zLEchZLsu1AcKKIFrMg3p/UHLEhtfwjH5fc1zdLThGniSRxixV4naNiEGoZSKaUr:0iZLn1SKIFlUHLEk75UJdcniSRxuV4aT

Malware Config

Targets

    • Target

      93fc71c7abef0a2fb2f0a618a1d18139_JaffaCakes118

    • Size

      339KB

    • MD5

      93fc71c7abef0a2fb2f0a618a1d18139

    • SHA1

      36588c85f2293993475b345fe85be8c02f6bd7f9

    • SHA256

      e03d8ab413dde35119ddf1454abe9b56b624c8979435c7bc5e63e2001c02d82c

    • SHA512

      9156254fe37533c7ca442e8afb3d62e19c1695ffc94b8653180f8a0e1780bf8e57b28cec8f4236da7f23501ce240c50da162fa4e45ed5e02e2098734c0ec97eb

    • SSDEEP

      6144:zLEchZLsu1AcKKIFrMg3p/UHLEhtfwjH5fc1zdLThGniSRxixV4naNiEGoZSKaUr:0iZLn1SKIFlUHLEk75UJdcniSRxuV4aT

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks