General

  • Target

    b57a2981ed5fff98b4b4aa6a52a1a950_JaffaCakes118

  • Size

    537KB

  • Sample

    240821-3g5nzswfrg

  • MD5

    b57a2981ed5fff98b4b4aa6a52a1a950

  • SHA1

    c175f272f3164dc2fe0f82df26561d7bfe7e9ef5

  • SHA256

    ee1f9d440c14ace09e4d92985900363101ca4baf351aa28c844a760b1629c879

  • SHA512

    ec1e1e3eff2539e3fa2b2dfabb356dddd09d55ae16eba51f6310ca8cc5a0e5dca76fd8aff65b33952f4edf068d72eea15096791763c981cb114a2d905bf364cd

  • SSDEEP

    6144:GWZfec9EbXDk6RkQKVrG1VVE+IwrG1VVE+IwrG1VVE+I9/UOPSe570Szp3irG1VR:3ZWtI6RkrununuROB0Jut

Malware Config

Targets

    • Target

      b57a2981ed5fff98b4b4aa6a52a1a950_JaffaCakes118

    • Size

      537KB

    • MD5

      b57a2981ed5fff98b4b4aa6a52a1a950

    • SHA1

      c175f272f3164dc2fe0f82df26561d7bfe7e9ef5

    • SHA256

      ee1f9d440c14ace09e4d92985900363101ca4baf351aa28c844a760b1629c879

    • SHA512

      ec1e1e3eff2539e3fa2b2dfabb356dddd09d55ae16eba51f6310ca8cc5a0e5dca76fd8aff65b33952f4edf068d72eea15096791763c981cb114a2d905bf364cd

    • SSDEEP

      6144:GWZfec9EbXDk6RkQKVrG1VVE+IwrG1VVE+IwrG1VVE+I9/UOPSe570Szp3irG1VR:3ZWtI6RkrununuROB0Jut

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks