General

  • Target

    ecbb892e051750d8405efc088548d9eb_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240920-dq2k9avhrf

  • MD5

    ecbb892e051750d8405efc088548d9eb

  • SHA1

    dd6d4684abbf1f79008ef61e725ee613a7a92b81

  • SHA256

    1ac2cfb52b31b1ca0129deb5ffd65afada0a750700339b33fd8646d8c43960cb

  • SHA512

    7792e40cc1d55ca137a0839e85de54c89142e2dedaf8517878b728b7c38f8638886b44fe313ff752614d79a9218d9485961f9930158a9beef9f207e50200a0a7

  • SSDEEP

    12288:3ZWtI6RkUOKKu9O3OKKu9O3OKKu9O3OKKu8SI:3uhaXI

Malware Config

Targets

    • Target

      ecbb892e051750d8405efc088548d9eb_JaffaCakes118

    • Size

      1.2MB

    • MD5

      ecbb892e051750d8405efc088548d9eb

    • SHA1

      dd6d4684abbf1f79008ef61e725ee613a7a92b81

    • SHA256

      1ac2cfb52b31b1ca0129deb5ffd65afada0a750700339b33fd8646d8c43960cb

    • SHA512

      7792e40cc1d55ca137a0839e85de54c89142e2dedaf8517878b728b7c38f8638886b44fe313ff752614d79a9218d9485961f9930158a9beef9f207e50200a0a7

    • SSDEEP

      12288:3ZWtI6RkUOKKu9O3OKKu9O3OKKu9O3OKKu8SI:3uhaXI

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks