General

  • Target

    eaca782d8da4025edd29d4f045fe6915_JaffaCakes118

  • Size

    923KB

  • Sample

    240919-hleyxawdkm

  • MD5

    eaca782d8da4025edd29d4f045fe6915

  • SHA1

    6c946609cd0784315b259bf6fe38212ec1786cc1

  • SHA256

    492b7b76f3622334e3e4dfe2ddaa50364a568f331a1667164b9fe325a123b723

  • SHA512

    eb73bca09b46e8884f292bd00b31ad0fe199dc968c17ec5e0a3a0b573e03636770812f28eea3e1aebf7e407a713dbcdb41f25641b8e4530a19ea807df9ddbe81

  • SSDEEP

    12288:Nk7TTfY2hLmjLAu24HOX+3Sa7JbqVKOP8tVBCbHkOS09tzcTY93r0rtK0Yd051nc:djLAu7OsdG8tzCjW07zoNrwfSnJHSmy1

Malware Config

Targets

    • Target

      eaca782d8da4025edd29d4f045fe6915_JaffaCakes118

    • Size

      923KB

    • MD5

      eaca782d8da4025edd29d4f045fe6915

    • SHA1

      6c946609cd0784315b259bf6fe38212ec1786cc1

    • SHA256

      492b7b76f3622334e3e4dfe2ddaa50364a568f331a1667164b9fe325a123b723

    • SHA512

      eb73bca09b46e8884f292bd00b31ad0fe199dc968c17ec5e0a3a0b573e03636770812f28eea3e1aebf7e407a713dbcdb41f25641b8e4530a19ea807df9ddbe81

    • SSDEEP

      12288:Nk7TTfY2hLmjLAu24HOX+3Sa7JbqVKOP8tVBCbHkOS09tzcTY93r0rtK0Yd051nc:djLAu7OsdG8tzCjW07zoNrwfSnJHSmy1

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks