General

  • Target

    c76141e13308094458e286319666dc84_JaffaCakes118

  • Size

    39.4MB

  • Sample

    240828-wr3ttayhme

  • MD5

    c76141e13308094458e286319666dc84

  • SHA1

    4c9d7fb803f780360da37fe161ce620eb37369c9

  • SHA256

    ece29c107e018da8244142f86a1249dc8bf40b71826b03d632a96f89624f73a2

  • SHA512

    f54bb31695b2b5fb631e3bd8969d35ed5edf01bfcd19597cd9607a974ac63800dce4cf5f3cf3cfd92cd8733e64cb4d8febf43e0709ff99dbb56cb7a6078d89d9

  • SSDEEP

    786432:Hkxc4BiiqqeuC9H607Yd0FPAwt3f3DXXo1wg+37TLYVzvWVHg:Hsdqqez9H7wWPRt3f3bXo1wN+

Malware Config

Targets

    • Target

      c76141e13308094458e286319666dc84_JaffaCakes118

    • Size

      39.4MB

    • MD5

      c76141e13308094458e286319666dc84

    • SHA1

      4c9d7fb803f780360da37fe161ce620eb37369c9

    • SHA256

      ece29c107e018da8244142f86a1249dc8bf40b71826b03d632a96f89624f73a2

    • SHA512

      f54bb31695b2b5fb631e3bd8969d35ed5edf01bfcd19597cd9607a974ac63800dce4cf5f3cf3cfd92cd8733e64cb4d8febf43e0709ff99dbb56cb7a6078d89d9

    • SSDEEP

      786432:Hkxc4BiiqqeuC9H607Yd0FPAwt3f3DXXo1wg+37TLYVzvWVHg:Hsdqqez9H7wWPRt3f3bXo1wN+

    • Modifies firewall policy service

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks