General

  • Target

    e257b31b637a3a1e7ea7f05363ec62fb_JaffaCakes118

  • Size

    797KB

  • Sample

    240915-m78wbs1fjq

  • MD5

    e257b31b637a3a1e7ea7f05363ec62fb

  • SHA1

    de788a62695038c6c4a55f49705ead0df5268da7

  • SHA256

    7ad13d35f08f204e54ea6ebc1bb585648f6da29c7287b96db6336308ebb197b3

  • SHA512

    7e7a1ffb1d06efc49ac896c422962a554e0c5a8d8330e773ef4102edd1a92fdedb406575bde04e5bebd9e0d230282b62cc0a12f7647f49dc340dfe337c6598b5

  • SSDEEP

    12288:1tqzsxqboVzPaVuxh1ANaW+ENkUINCNeZryltxwnwdILDuPYT+fPdqj3kNJ41tFZ:1ecNiVSASOWpZeKwO9TKKmJ41TskH

Malware Config

Targets

    • Target

      e257b31b637a3a1e7ea7f05363ec62fb_JaffaCakes118

    • Size

      797KB

    • MD5

      e257b31b637a3a1e7ea7f05363ec62fb

    • SHA1

      de788a62695038c6c4a55f49705ead0df5268da7

    • SHA256

      7ad13d35f08f204e54ea6ebc1bb585648f6da29c7287b96db6336308ebb197b3

    • SHA512

      7e7a1ffb1d06efc49ac896c422962a554e0c5a8d8330e773ef4102edd1a92fdedb406575bde04e5bebd9e0d230282b62cc0a12f7647f49dc340dfe337c6598b5

    • SSDEEP

      12288:1tqzsxqboVzPaVuxh1ANaW+ENkUINCNeZryltxwnwdILDuPYT+fPdqj3kNJ41tFZ:1ecNiVSASOWpZeKwO9TKKmJ41TskH

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks