General

  • Target

    eacc501779cdc2fda21e317648e08d0f_JaffaCakes118

  • Size

    323KB

  • Sample

    240919-hn9laswclg

  • MD5

    eacc501779cdc2fda21e317648e08d0f

  • SHA1

    d71ca3f7056b48cfa2492861f233e1f3bd507501

  • SHA256

    16f7966200b4ba1364535b144ac53144f4f0e6cba24529a234b6c22f65fbc485

  • SHA512

    b221044d1e68270b671e6844d7693a3e18af494d9cd6517c5c22dfbf78fb839a6a16b054bdf158b50e36a833cd05c125a270f0aaf970b98dd0e2b151d0e5748b

  • SSDEEP

    6144:OBxeN/Tdx8YzL+4eBDgelLBL9C53TV5n+yNXavM:OBxe9dx8Yz6nhtL9C53TV5n+4av

Malware Config

Targets

    • Target

      eacc501779cdc2fda21e317648e08d0f_JaffaCakes118

    • Size

      323KB

    • MD5

      eacc501779cdc2fda21e317648e08d0f

    • SHA1

      d71ca3f7056b48cfa2492861f233e1f3bd507501

    • SHA256

      16f7966200b4ba1364535b144ac53144f4f0e6cba24529a234b6c22f65fbc485

    • SHA512

      b221044d1e68270b671e6844d7693a3e18af494d9cd6517c5c22dfbf78fb839a6a16b054bdf158b50e36a833cd05c125a270f0aaf970b98dd0e2b151d0e5748b

    • SSDEEP

      6144:OBxeN/Tdx8YzL+4eBDgelLBL9C53TV5n+yNXavM:OBxe9dx8Yz6nhtL9C53TV5n+4av

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables cmd.exe use via registry modification

    • Disables use of System Restore points

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks