General

  • Target

    d1881d54c95a0f93575ed136dcf7b611_JaffaCakes118

  • Size

    3.8MB

  • Sample

    240907-km7resvhmd

  • MD5

    d1881d54c95a0f93575ed136dcf7b611

  • SHA1

    1f4ea5fd2214c92412e87c4bc10d22d5ea970c11

  • SHA256

    a2861984847571ba3749d01e7a1aa899ffc1ad35f7f13c023b7021c0770ac281

  • SHA512

    c55d585ccc583d133c8fb32cca403eae1bb7d73f2b8c08d7581ee6f1157fed06d68dee58a3b3b918cf61e374f12b65fec0952d0a2d7f6cc36c8837f43960ddfb

  • SSDEEP

    49152:H6Po9F7eWtgdKQgtGwIhc89HZDiu0O3r4jPcb7pKjJ0EsxmSknRxYiybFKWX55Mx:H6QXefcQEIh9p0KMj+8IjhbgWJ5a5/HJ

Malware Config

Targets

    • Target

      d1881d54c95a0f93575ed136dcf7b611_JaffaCakes118

    • Size

      3.8MB

    • MD5

      d1881d54c95a0f93575ed136dcf7b611

    • SHA1

      1f4ea5fd2214c92412e87c4bc10d22d5ea970c11

    • SHA256

      a2861984847571ba3749d01e7a1aa899ffc1ad35f7f13c023b7021c0770ac281

    • SHA512

      c55d585ccc583d133c8fb32cca403eae1bb7d73f2b8c08d7581ee6f1157fed06d68dee58a3b3b918cf61e374f12b65fec0952d0a2d7f6cc36c8837f43960ddfb

    • SSDEEP

      49152:H6Po9F7eWtgdKQgtGwIhc89HZDiu0O3r4jPcb7pKjJ0EsxmSknRxYiybFKWX55Mx:H6QXefcQEIh9p0KMj+8IjhbgWJ5a5/HJ

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks