General

  • Target

    ee9f4d7272e9e51f760f44524560ad26_JaffaCakes118

  • Size

    1.5MB

  • Sample

    240920-29gxystdnc

  • MD5

    ee9f4d7272e9e51f760f44524560ad26

  • SHA1

    b663c8d05aa145b3ced1983aeeb87ccd8129b5f9

  • SHA256

    6c4e8b02ac4f59fea62675f1e3f772e2a363463209259fdd1683600df70e0a62

  • SHA512

    5e0c9ce3b05c45a0f2fb70a0b2b1491a544e99bef0797c03b5414b7e8865ca154dbeccd38367fc9a5f5f4d260cc6b68f3925398e3f4942c6b6533cde8a97e1e7

  • SSDEEP

    12288:3ZWtI6Rk/yuVOSyuVOSyuVOSyuVOSyuVOSyuIqzpIys7bA:3uhajzpObA

Malware Config

Targets

    • Target

      ee9f4d7272e9e51f760f44524560ad26_JaffaCakes118

    • Size

      1.5MB

    • MD5

      ee9f4d7272e9e51f760f44524560ad26

    • SHA1

      b663c8d05aa145b3ced1983aeeb87ccd8129b5f9

    • SHA256

      6c4e8b02ac4f59fea62675f1e3f772e2a363463209259fdd1683600df70e0a62

    • SHA512

      5e0c9ce3b05c45a0f2fb70a0b2b1491a544e99bef0797c03b5414b7e8865ca154dbeccd38367fc9a5f5f4d260cc6b68f3925398e3f4942c6b6533cde8a97e1e7

    • SSDEEP

      12288:3ZWtI6Rk/yuVOSyuVOSyuVOSyuVOSyuVOSyuIqzpIys7bA:3uhajzpObA

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks