General

  • Target

    ed928c70045570c4439348e34a3a47fc_JaffaCakes118

  • Size

    403KB

  • Sample

    240920-phjk9aweql

  • MD5

    ed928c70045570c4439348e34a3a47fc

  • SHA1

    5fc0bc8e9bc79e6834e1f3686c01acd92d8abc0b

  • SHA256

    285e22e3a14ea7bb9859e76d4cabfabc6794364d36c8d63b1002753bf27aa225

  • SHA512

    ed162e69f3f6cd49f40ef1ff62c45657a43ad5ff3b534aea8e82fbb762221f90f3b69e5b0496455ba93d06b6432ba6928aec0c6a5a812e68f0c6c509740fb51d

  • SSDEEP

    6144:ZVziDHDWMyjtZcgBWiCF1k6ZEOrESOcQU76t/r+fhh0Kk5H7pE/FhUNHhrG8/:nziDaMmBWfcBXSOH1Vr+CaF4HhrG6

Malware Config

Targets

    • Target

      ed928c70045570c4439348e34a3a47fc_JaffaCakes118

    • Size

      403KB

    • MD5

      ed928c70045570c4439348e34a3a47fc

    • SHA1

      5fc0bc8e9bc79e6834e1f3686c01acd92d8abc0b

    • SHA256

      285e22e3a14ea7bb9859e76d4cabfabc6794364d36c8d63b1002753bf27aa225

    • SHA512

      ed162e69f3f6cd49f40ef1ff62c45657a43ad5ff3b534aea8e82fbb762221f90f3b69e5b0496455ba93d06b6432ba6928aec0c6a5a812e68f0c6c509740fb51d

    • SSDEEP

      6144:ZVziDHDWMyjtZcgBWiCF1k6ZEOrESOcQU76t/r+fhh0Kk5H7pE/FhUNHhrG8/:nziDaMmBWfcBXSOH1Vr+CaF4HhrG6

    • Modifies WinLogon for persistence

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks