General

  • Target

    d4516eb6cdc9ae47da4f356dc7de0398_JaffaCakes118

  • Size

    293KB

  • Sample

    240908-n9cfksvelk

  • MD5

    d4516eb6cdc9ae47da4f356dc7de0398

  • SHA1

    60df95817732a2ef46cab3d06d4c315e9acdebfa

  • SHA256

    dce5e4e43aa2c4321dd55941c79282a714679aabc0c10e1554ff1cec663cdd1a

  • SHA512

    59c48526dc957d48a16db5ec3d12c4df787f7a8502782234563638f068043398ac08b08977183eb16cd743acea947553bf8483a67155bd75d30fd106b913cca1

  • SSDEEP

    6144:WnLtlkUqcmJFJ6/o/4F4lqeIRZmp3mBNqaWDHxWuPX+HiZgksNWn5F:WBlkjnQowicLRZS2BNeIurznX

Malware Config

Targets

    • Target

      d4516eb6cdc9ae47da4f356dc7de0398_JaffaCakes118

    • Size

      293KB

    • MD5

      d4516eb6cdc9ae47da4f356dc7de0398

    • SHA1

      60df95817732a2ef46cab3d06d4c315e9acdebfa

    • SHA256

      dce5e4e43aa2c4321dd55941c79282a714679aabc0c10e1554ff1cec663cdd1a

    • SHA512

      59c48526dc957d48a16db5ec3d12c4df787f7a8502782234563638f068043398ac08b08977183eb16cd743acea947553bf8483a67155bd75d30fd106b913cca1

    • SSDEEP

      6144:WnLtlkUqcmJFJ6/o/4F4lqeIRZmp3mBNqaWDHxWuPX+HiZgksNWn5F:WBlkjnQowicLRZS2BNeIurznX

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks