General

  • Target

    edd162b5229adf2cb1ae6911a30e8bfe_JaffaCakes118

  • Size

    762KB

  • Sample

    240920-r4aata1hmg

  • MD5

    edd162b5229adf2cb1ae6911a30e8bfe

  • SHA1

    05afc0e5952bb5d0c841c62ce6a48de9e190b2b4

  • SHA256

    e4e47b0b15893279c59463460e29544367028e56f0deec68a7a0b335b6466517

  • SHA512

    17cface237dfe52e1c1a3ca796e499ed92d2d603e04f8e47ce4884907dbfd3636927e7db7426a8cb35c602ee9683a69c1f62084df5143439e38d8da471568cfc

  • SSDEEP

    6144:GWZfec9EbXDk6RkQKUGFrQZb++tdsHP4+QfI6UXnmy+g4IE2E/nmy+g4H:3ZWtI6Rk6erQZb+md4w1UXa/2

Malware Config

Targets

    • Target

      edd162b5229adf2cb1ae6911a30e8bfe_JaffaCakes118

    • Size

      762KB

    • MD5

      edd162b5229adf2cb1ae6911a30e8bfe

    • SHA1

      05afc0e5952bb5d0c841c62ce6a48de9e190b2b4

    • SHA256

      e4e47b0b15893279c59463460e29544367028e56f0deec68a7a0b335b6466517

    • SHA512

      17cface237dfe52e1c1a3ca796e499ed92d2d603e04f8e47ce4884907dbfd3636927e7db7426a8cb35c602ee9683a69c1f62084df5143439e38d8da471568cfc

    • SSDEEP

      6144:GWZfec9EbXDk6RkQKUGFrQZb++tdsHP4+QfI6UXnmy+g4IE2E/nmy+g4H:3ZWtI6Rk6erQZb+md4w1UXa/2

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks