General

  • Target

    bc603b4e8ed49b76fa56d0d51dcaab29_JaffaCakes118

  • Size

    31KB

  • Sample

    240823-s9xhzatbpf

  • MD5

    bc603b4e8ed49b76fa56d0d51dcaab29

  • SHA1

    0b8604f36e971de443fcbd0f3df7696731f060ab

  • SHA256

    5bad9db35ada133d4119d2653ac3d3ca820d39b423e763884c911be9f3bdac9c

  • SHA512

    687d2fef6e11eebcaf2cb582f4b1b8ebe729db8ad65a0311a1a8f2db2b8455524a2a2a45c8d9e8640f8362f5d06135949e01389ebe1afb8baefeaba2191f67bd

  • SSDEEP

    768:qOidcUykHSIdGq+o21AfgHATVgZ4phmnfcHTinbcuyD7UTNWGG:qPyiomVgSpAE2nouy8ZU

Malware Config

Targets

    • Target

      bc603b4e8ed49b76fa56d0d51dcaab29_JaffaCakes118

    • Size

      31KB

    • MD5

      bc603b4e8ed49b76fa56d0d51dcaab29

    • SHA1

      0b8604f36e971de443fcbd0f3df7696731f060ab

    • SHA256

      5bad9db35ada133d4119d2653ac3d3ca820d39b423e763884c911be9f3bdac9c

    • SHA512

      687d2fef6e11eebcaf2cb582f4b1b8ebe729db8ad65a0311a1a8f2db2b8455524a2a2a45c8d9e8640f8362f5d06135949e01389ebe1afb8baefeaba2191f67bd

    • SSDEEP

      768:qOidcUykHSIdGq+o21AfgHATVgZ4phmnfcHTinbcuyD7UTNWGG:qPyiomVgSpAE2nouy8ZU

    • UAC bypass

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks