General

  • Target

    ee86a7548f154536339f671846623c07_JaffaCakes118

  • Size

    814KB

  • Sample

    240920-15bdya1cjf

  • MD5

    ee86a7548f154536339f671846623c07

  • SHA1

    edf0857d32145811d771383e0e1963a64cc59a78

  • SHA256

    feeba33f7c211e4131a4b180562d0989716143b6ef3f79c047ffdd91c6181b38

  • SHA512

    6a5d4f08a05af29ff70171d4fd7b8a1e4691845eaa83f3af001c5346478606194fd33a077cde145c8b62de24d7d60ee272aa1ad820a9732c2641fe1a59c416ce

  • SSDEEP

    12288:s69zDWz/xwNqdlbrIX3JALF1QbOagrEGgtNryyCJuDT/PNa0AYQ/HywPtDt4:s2DW/xbHX2YIbCQsu3/PNL7Q/Hywtx4

Malware Config

Targets

    • Target

      ee86a7548f154536339f671846623c07_JaffaCakes118

    • Size

      814KB

    • MD5

      ee86a7548f154536339f671846623c07

    • SHA1

      edf0857d32145811d771383e0e1963a64cc59a78

    • SHA256

      feeba33f7c211e4131a4b180562d0989716143b6ef3f79c047ffdd91c6181b38

    • SHA512

      6a5d4f08a05af29ff70171d4fd7b8a1e4691845eaa83f3af001c5346478606194fd33a077cde145c8b62de24d7d60ee272aa1ad820a9732c2641fe1a59c416ce

    • SSDEEP

      12288:s69zDWz/xwNqdlbrIX3JALF1QbOagrEGgtNryyCJuDT/PNa0AYQ/HywPtDt4:s2DW/xbHX2YIbCQsu3/PNL7Q/Hywtx4

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks