General

  • Target

    ee2b63adb349042b0e17ff3d3aa5853a_JaffaCakes118

  • Size

    504KB

  • Sample

    240920-wyc7qszgla

  • MD5

    ee2b63adb349042b0e17ff3d3aa5853a

  • SHA1

    dfa6701f5480edcb90e5ec398fe255b3fb967871

  • SHA256

    e2f90ffa7ec19b926bde059d68b362c6d5d341569002b8fcf9443a2405664893

  • SHA512

    c801178541bc6583e9cb34d5341e2988426f0565cce02e20f74cd331afae820935827334cb7419576801428dc33b0f47138de605a2b1056a0850813ce1bdce9b

  • SSDEEP

    12288:2z8Z16O1hxOJ+W58t4YcYyD7Cat4iODvd/:2U1pmJoyxtPGd/

Malware Config

Targets

    • Target

      ee2b63adb349042b0e17ff3d3aa5853a_JaffaCakes118

    • Size

      504KB

    • MD5

      ee2b63adb349042b0e17ff3d3aa5853a

    • SHA1

      dfa6701f5480edcb90e5ec398fe255b3fb967871

    • SHA256

      e2f90ffa7ec19b926bde059d68b362c6d5d341569002b8fcf9443a2405664893

    • SHA512

      c801178541bc6583e9cb34d5341e2988426f0565cce02e20f74cd331afae820935827334cb7419576801428dc33b0f47138de605a2b1056a0850813ce1bdce9b

    • SSDEEP

      12288:2z8Z16O1hxOJ+W58t4YcYyD7Cat4iODvd/:2U1pmJoyxtPGd/

    • Modifies firewall policy service

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks