General

  • Target

    aa200660d0350c765ccd68f9762beccf_JaffaCakes118

  • Size

    1006KB

  • Sample

    240819-jbkbba1eng

  • MD5

    aa200660d0350c765ccd68f9762beccf

  • SHA1

    65d577fe0a6a4fc1940b1cee8e6a3d6ffbff51be

  • SHA256

    1dbfc2c66fac03aada255fde6d84c4601df201e6e265dc52e6edd3dcfc2970f4

  • SHA512

    c89a431e3a01df01b749428c2b6a324f2502d3526ac3a46887310d3608ff27a0261d9c7d3803a26069cf1b5a909af3ac56e251ce586c0e283a0e9bb9afb8214d

  • SSDEEP

    24576:Q3EBZr0COrZPkYLudlSgQ9vOlWDWdCYH3d+xTKRrIqfwL6YXPBs:Q33MBl69IMWUW3dcg0GwL6

Malware Config

Targets

    • Target

      aa200660d0350c765ccd68f9762beccf_JaffaCakes118

    • Size

      1006KB

    • MD5

      aa200660d0350c765ccd68f9762beccf

    • SHA1

      65d577fe0a6a4fc1940b1cee8e6a3d6ffbff51be

    • SHA256

      1dbfc2c66fac03aada255fde6d84c4601df201e6e265dc52e6edd3dcfc2970f4

    • SHA512

      c89a431e3a01df01b749428c2b6a324f2502d3526ac3a46887310d3608ff27a0261d9c7d3803a26069cf1b5a909af3ac56e251ce586c0e283a0e9bb9afb8214d

    • SSDEEP

      24576:Q3EBZr0COrZPkYLudlSgQ9vOlWDWdCYH3d+xTKRrIqfwL6YXPBs:Q33MBl69IMWUW3dcg0GwL6

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks