General

  • Target

    edc89e437810ad2dd25408506be22aee_JaffaCakes118

  • Size

    31KB

  • Sample

    240920-rrttpa1fpm

  • MD5

    edc89e437810ad2dd25408506be22aee

  • SHA1

    24f081c3e122d180a3fd0064674ab65d73108a75

  • SHA256

    77fd9e57ce0253b4e336530a37206b3cc6334a1bf12116a891e2887624cb6e18

  • SHA512

    09e07a04d93ae32dfd8771d7b738d88deef3e89f6fcb669cc5b4b65c4a22faec95e17c245b16542de57da84cff1e527354167e0fc7fca1b0860098c36b58e92b

  • SSDEEP

    768:5dOUS/ijAceYdW2k7GfOmBFtOYu9IezVDy0SunbcuyD7UINWGO:5PS/ijAk5kSmK+Yu9I4Sunouy8Yo

Malware Config

Targets

    • Target

      edc89e437810ad2dd25408506be22aee_JaffaCakes118

    • Size

      31KB

    • MD5

      edc89e437810ad2dd25408506be22aee

    • SHA1

      24f081c3e122d180a3fd0064674ab65d73108a75

    • SHA256

      77fd9e57ce0253b4e336530a37206b3cc6334a1bf12116a891e2887624cb6e18

    • SHA512

      09e07a04d93ae32dfd8771d7b738d88deef3e89f6fcb669cc5b4b65c4a22faec95e17c245b16542de57da84cff1e527354167e0fc7fca1b0860098c36b58e92b

    • SSDEEP

      768:5dOUS/ijAceYdW2k7GfOmBFtOYu9IezVDy0SunbcuyD7UINWGO:5PS/ijAk5kSmK+Yu9I4Sunouy8Yo

    • UAC bypass

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks