General

  • Target

    eea588d087569e0c85f0546a661db831_JaffaCakes118

  • Size

    58KB

  • Sample

    240920-3h2zgsthme

  • MD5

    eea588d087569e0c85f0546a661db831

  • SHA1

    d962d133d8eba0617faa005d01525448638214a5

  • SHA256

    b3a51f318c72d3a403456ea51ba2ff8d78d0a94d795b88156151a8261aff9523

  • SHA512

    c19573c9c58ff73cbd68dc459ef813af35a4124837b4a990b7526e042c546943958603669921c39b623e8b3f3c74939dc6adca3da2d8b065c52684eaea8fceca

  • SSDEEP

    1536:t1l2d56o8BlC0s2O5zLxvoCPLs144qK2Nf:PgCoUUjJLxgCPLk442

Malware Config

Targets

    • Target

      eea588d087569e0c85f0546a661db831_JaffaCakes118

    • Size

      58KB

    • MD5

      eea588d087569e0c85f0546a661db831

    • SHA1

      d962d133d8eba0617faa005d01525448638214a5

    • SHA256

      b3a51f318c72d3a403456ea51ba2ff8d78d0a94d795b88156151a8261aff9523

    • SHA512

      c19573c9c58ff73cbd68dc459ef813af35a4124837b4a990b7526e042c546943958603669921c39b623e8b3f3c74939dc6adca3da2d8b065c52684eaea8fceca

    • SSDEEP

      1536:t1l2d56o8BlC0s2O5zLxvoCPLs144qK2Nf:PgCoUUjJLxgCPLk442

    • Modifies WinLogon for persistence

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks