General

  • Target

    a23d4fe14cbbc32ba8decdd23992c3e2_JaffaCakes118

  • Size

    119KB

  • Sample

    240817-mwv54a1gkf

  • MD5

    a23d4fe14cbbc32ba8decdd23992c3e2

  • SHA1

    330bf033c0d4aeea277375dd9502d5bc95915931

  • SHA256

    8968e7e83d06cb822cdcaf2489ad1acee1195d97b500482002e4824011731fc7

  • SHA512

    fb38b08d8d86f4b389d156ddc3094f39d523e740c15f7c0fdafb4c19e8e7629afe5ce38d5c09f4fe4b454281f701f31052537e2bd40653ca16c9d95cdd4345c2

  • SSDEEP

    3072:ecOzwIN8UQWgUjiXzGJQlDmJVzoisvkQmkPP:JDWnulGVs7sQmkH

Malware Config

Targets

    • Target

      a23d4fe14cbbc32ba8decdd23992c3e2_JaffaCakes118

    • Size

      119KB

    • MD5

      a23d4fe14cbbc32ba8decdd23992c3e2

    • SHA1

      330bf033c0d4aeea277375dd9502d5bc95915931

    • SHA256

      8968e7e83d06cb822cdcaf2489ad1acee1195d97b500482002e4824011731fc7

    • SHA512

      fb38b08d8d86f4b389d156ddc3094f39d523e740c15f7c0fdafb4c19e8e7629afe5ce38d5c09f4fe4b454281f701f31052537e2bd40653ca16c9d95cdd4345c2

    • SSDEEP

      3072:ecOzwIN8UQWgUjiXzGJQlDmJVzoisvkQmkPP:JDWnulGVs7sQmkH

    • Modifies firewall policy service

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks