General

  • Target

    c29d86a3da7bd8c787ba42fc108cc96c_JaffaCakes118

  • Size

    936KB

  • Sample

    240826-j9qkzswbnm

  • MD5

    c29d86a3da7bd8c787ba42fc108cc96c

  • SHA1

    5b9df66d8246807fe05157e276f47a0d99b804a1

  • SHA256

    13d6d8f876ec676342741d23bfa2b91c6b06ca438c66aa60405d37e02ff0c98d

  • SHA512

    8e92b169c4269eb52d744829e6ef4dc7cf288ff6ebf31391b00458dc019f9b790f73f30297464ffcd68f4729373603e97cc480c5f7aa32da2a527b82193d545d

  • SSDEEP

    12288:4xVlw9j70VOsvZaYmmAExM9XUYYoStujIhx:WOhYVOsiTt9XRYoStujI3

Malware Config

Targets

    • Target

      c29d86a3da7bd8c787ba42fc108cc96c_JaffaCakes118

    • Size

      936KB

    • MD5

      c29d86a3da7bd8c787ba42fc108cc96c

    • SHA1

      5b9df66d8246807fe05157e276f47a0d99b804a1

    • SHA256

      13d6d8f876ec676342741d23bfa2b91c6b06ca438c66aa60405d37e02ff0c98d

    • SHA512

      8e92b169c4269eb52d744829e6ef4dc7cf288ff6ebf31391b00458dc019f9b790f73f30297464ffcd68f4729373603e97cc480c5f7aa32da2a527b82193d545d

    • SSDEEP

      12288:4xVlw9j70VOsvZaYmmAExM9XUYYoStujIhx:WOhYVOsiTt9XRYoStujI3

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks