General

  • Target

    ecb1cff38ba6eae32245d460b795ee40_JaffaCakes118

  • Size

    388KB

  • Sample

    240920-da42favhkr

  • MD5

    ecb1cff38ba6eae32245d460b795ee40

  • SHA1

    75a2292503e56e3a1921c6940186529632edd358

  • SHA256

    7cffdf7022772c3ab793f54080f353dab61636873020383b6938c33d49abc547

  • SHA512

    54a04fe883bad710cdec1cfc841ba0b3621a291cc272c88409a38bba4b89c14e9087913fed42e15912a647cb97644d8b772ba15d7902a016d590c93892454428

  • SSDEEP

    6144:ZOF2f3TwaNQ0aPPjCPewCDfrdKUsMe5xgz0TBtArmlFhKuDOR:o2f0oQ0aPPjC6DfxKUPSggTBtAyhKuDS

Malware Config

Targets

    • Target

      ecb1cff38ba6eae32245d460b795ee40_JaffaCakes118

    • Size

      388KB

    • MD5

      ecb1cff38ba6eae32245d460b795ee40

    • SHA1

      75a2292503e56e3a1921c6940186529632edd358

    • SHA256

      7cffdf7022772c3ab793f54080f353dab61636873020383b6938c33d49abc547

    • SHA512

      54a04fe883bad710cdec1cfc841ba0b3621a291cc272c88409a38bba4b89c14e9087913fed42e15912a647cb97644d8b772ba15d7902a016d590c93892454428

    • SSDEEP

      6144:ZOF2f3TwaNQ0aPPjCPewCDfrdKUsMe5xgz0TBtArmlFhKuDOR:o2f0oQ0aPPjC6DfxKUPSggTBtAyhKuDS

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks