General

  • Target

    ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118

  • Size

    246KB

  • Sample

    240920-hh51xstfnm

  • MD5

    ed0ac3ec754cb2fa9cb4513394316573

  • SHA1

    05564f7f4d5d05511346fd855b7dc7b2e67fb16b

  • SHA256

    d3f488cbb6fa9c76667767180c1486e285aa923040a3ec849d85b7be682a161b

  • SHA512

    461775058079e11587e5c931906aeff2c080db0e13a721522a09f1adfd7044bf561b744c86fb3c3f2872086b136907a1586e04392a8027d5eaed6766fcccaafc

  • SSDEEP

    6144:guMJWY+qaHEQCcYfSBYJbQCjRcqESEgm6Anhc1kG6Evy:g+YcUc6SBLLTSEgBAnhc1kG

Malware Config

Targets

    • Target

      ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118

    • Size

      246KB

    • MD5

      ed0ac3ec754cb2fa9cb4513394316573

    • SHA1

      05564f7f4d5d05511346fd855b7dc7b2e67fb16b

    • SHA256

      d3f488cbb6fa9c76667767180c1486e285aa923040a3ec849d85b7be682a161b

    • SHA512

      461775058079e11587e5c931906aeff2c080db0e13a721522a09f1adfd7044bf561b744c86fb3c3f2872086b136907a1586e04392a8027d5eaed6766fcccaafc

    • SSDEEP

      6144:guMJWY+qaHEQCcYfSBYJbQCjRcqESEgm6Anhc1kG6Evy:g+YcUc6SBLLTSEgBAnhc1kG

    • Modifies WinLogon for persistence

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks