General

  • Target

    d9c662c6c99bfff82fd15a43b1920109_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240911-g4453swgjj

  • MD5

    d9c662c6c99bfff82fd15a43b1920109

  • SHA1

    f6467237f759cbd41053272186e629f5042d9913

  • SHA256

    68391efce6825481b73ae7f1b88ab504aee46c13a78d54066908a98a689d72bc

  • SHA512

    3c9a1cc5a4adb1c56787fde1c6abe916b34de917aa0765b130f2b595894b85aacbd2f68573dd7bb2118fc7fdcc2ff310431bbaba9c315443b9949a104cb6f428

  • SSDEEP

    49152:by8NKexlDkYOMwwnMb4PmyVUL/XCph7GBfWju:LKYOXwnS4rVaC77GBfWju

Malware Config

Targets

    • Target

      d9c662c6c99bfff82fd15a43b1920109_JaffaCakes118

    • Size

      2.6MB

    • MD5

      d9c662c6c99bfff82fd15a43b1920109

    • SHA1

      f6467237f759cbd41053272186e629f5042d9913

    • SHA256

      68391efce6825481b73ae7f1b88ab504aee46c13a78d54066908a98a689d72bc

    • SHA512

      3c9a1cc5a4adb1c56787fde1c6abe916b34de917aa0765b130f2b595894b85aacbd2f68573dd7bb2118fc7fdcc2ff310431bbaba9c315443b9949a104cb6f428

    • SSDEEP

      49152:by8NKexlDkYOMwwnMb4PmyVUL/XCph7GBfWju:LKYOXwnS4rVaC77GBfWju

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks