General

  • Target

    df8cefcaa51a5978b2c8d4766af57bf7_JaffaCakes118

  • Size

    701KB

  • Sample

    240914-ft151axhnm

  • MD5

    df8cefcaa51a5978b2c8d4766af57bf7

  • SHA1

    7d37202db4f88ed5fbd82a73b3efb64b87f58cef

  • SHA256

    5c31ec4caf36c585c34824e4a980262a9b607b830965e0f2c535514bee270753

  • SHA512

    a8763accde087fd57e7a304392de56a00fab8ff3d870de34c5351ec8d911521e62daacdbf5368eeb464d931f989b24df0ab8d4a13e8e993ce32f66adf30fd519

  • SSDEEP

    12288:AngXHl7Tzp5Z5/EJtKlIlzc3qfNEi7XFzceUsNy8r3W8TMa9JJpiNwHOYe5FVPif:AydES61EiJzUSyiT/iNwux5FVP4r0

Malware Config

Targets

    • Target

      df8cefcaa51a5978b2c8d4766af57bf7_JaffaCakes118

    • Size

      701KB

    • MD5

      df8cefcaa51a5978b2c8d4766af57bf7

    • SHA1

      7d37202db4f88ed5fbd82a73b3efb64b87f58cef

    • SHA256

      5c31ec4caf36c585c34824e4a980262a9b607b830965e0f2c535514bee270753

    • SHA512

      a8763accde087fd57e7a304392de56a00fab8ff3d870de34c5351ec8d911521e62daacdbf5368eeb464d931f989b24df0ab8d4a13e8e993ce32f66adf30fd519

    • SSDEEP

      12288:AngXHl7Tzp5Z5/EJtKlIlzc3qfNEi7XFzceUsNy8r3W8TMa9JJpiNwHOYe5FVPif:AydES61EiJzUSyiT/iNwux5FVP4r0

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks