General

  • Target

    ed0163730cb3ee097b2bfe0ddc48f727_JaffaCakes118

  • Size

    810KB

  • Sample

    240920-g4lnqssepd

  • MD5

    ed0163730cb3ee097b2bfe0ddc48f727

  • SHA1

    587ea5d217cde51bd04d84b50dd2de087db5be4c

  • SHA256

    6934541fb07c080e0908a827814299957b5b9a5355fe0563b7b8d5e32f5a5935

  • SHA512

    13544b55ed5afefcadbbd5c937224623d75aea96e4fdf7e034224c9dab7e9b96efae50f9078fdd5491aca6dfeb62a1c2287b63bec033b3ad69e2478cd05c6e7f

  • SSDEEP

    6144:GWZfec9EbXDk6RkQKpYrG1VVE+Ih/UOPSe570Szp3fuHOJrG1VVE+Ih/UOPSe57H:3ZWtI6RkoupOB0DO9upOB01LumW

Malware Config

Targets

    • Target

      ed0163730cb3ee097b2bfe0ddc48f727_JaffaCakes118

    • Size

      810KB

    • MD5

      ed0163730cb3ee097b2bfe0ddc48f727

    • SHA1

      587ea5d217cde51bd04d84b50dd2de087db5be4c

    • SHA256

      6934541fb07c080e0908a827814299957b5b9a5355fe0563b7b8d5e32f5a5935

    • SHA512

      13544b55ed5afefcadbbd5c937224623d75aea96e4fdf7e034224c9dab7e9b96efae50f9078fdd5491aca6dfeb62a1c2287b63bec033b3ad69e2478cd05c6e7f

    • SSDEEP

      6144:GWZfec9EbXDk6RkQKpYrG1VVE+Ih/UOPSe570Szp3fuHOJrG1VVE+Ih/UOPSe57H:3ZWtI6RkoupOB0DO9upOB01LumW

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks