General

  • Target

    b685dd784dadd9ed726975a46ba0d55d_JaffaCakes118

  • Size

    2.8MB

  • Sample

    240822-gabaxathnn

  • MD5

    b685dd784dadd9ed726975a46ba0d55d

  • SHA1

    81345596b1cf84f04edbef126e5ce62960e3028b

  • SHA256

    322fe744193c8f4b4192af0040c52e845b6ad1029f00b6ebee458f016dd08a31

  • SHA512

    e3f784febadcc00932add7e5f9fa39f7553f60bf77e707100e64832894aa9f7a97af193b9975564741ec966f0795309e33ddb5c27c250f0008ccf5e550368afb

  • SSDEEP

    49152:Y4erQZbd2DVerQZbd2DVerQZbd2DberQZbd2a8:grQZ08rQZ08rQZ0SrQZ8

Malware Config

Targets

    • Target

      b685dd784dadd9ed726975a46ba0d55d_JaffaCakes118

    • Size

      2.8MB

    • MD5

      b685dd784dadd9ed726975a46ba0d55d

    • SHA1

      81345596b1cf84f04edbef126e5ce62960e3028b

    • SHA256

      322fe744193c8f4b4192af0040c52e845b6ad1029f00b6ebee458f016dd08a31

    • SHA512

      e3f784febadcc00932add7e5f9fa39f7553f60bf77e707100e64832894aa9f7a97af193b9975564741ec966f0795309e33ddb5c27c250f0008ccf5e550368afb

    • SSDEEP

      49152:Y4erQZbd2DVerQZbd2DVerQZbd2DberQZbd2a8:grQZ08rQZ08rQZ0SrQZ8

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks