General

  • Target

    dfa4420fb7fd7f0d734fa51b4d6ea405_JaffaCakes118

  • Size

    1.4MB

  • Sample

    240914-g28eqazfkl

  • MD5

    dfa4420fb7fd7f0d734fa51b4d6ea405

  • SHA1

    84819366af44b0a38e03cb649126729155d8d17b

  • SHA256

    bc0292a0f4dcc6246ab81e0ec2e9134eca38afe350fe25b30884f58acb7b6e78

  • SHA512

    9efe1d97de55fc7692778f3275b15c88233ee050f393544452580344dcd40135d72810558b3be479cc5155eacff1f07f2adc82ded3dd16b87166f276166fb8e1

  • SSDEEP

    24576:uR7jO0E+rDRi138alI+c0dOxRqYRWEbY8HmF464UOPm4MEUpHYE3CKg:QjOUD0lB5dQIEbYISSPcPHYMC

Malware Config

Targets

    • Target

      dfa4420fb7fd7f0d734fa51b4d6ea405_JaffaCakes118

    • Size

      1.4MB

    • MD5

      dfa4420fb7fd7f0d734fa51b4d6ea405

    • SHA1

      84819366af44b0a38e03cb649126729155d8d17b

    • SHA256

      bc0292a0f4dcc6246ab81e0ec2e9134eca38afe350fe25b30884f58acb7b6e78

    • SHA512

      9efe1d97de55fc7692778f3275b15c88233ee050f393544452580344dcd40135d72810558b3be479cc5155eacff1f07f2adc82ded3dd16b87166f276166fb8e1

    • SSDEEP

      24576:uR7jO0E+rDRi138alI+c0dOxRqYRWEbY8HmF464UOPm4MEUpHYE3CKg:QjOUD0lB5dQIEbYISSPcPHYMC

    • Server Software Component: Terminal Services DLL

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks