General

  • Target

    eeb24a1ba8ac5d382158a0cf6818be1d_JaffaCakes118

  • Size

    40KB

  • Sample

    240921-acwajavhpf

  • MD5

    eeb24a1ba8ac5d382158a0cf6818be1d

  • SHA1

    078dd0c061a3afe3171437d504d2562e9ebd3201

  • SHA256

    2d49431463da6ba1b804807898881ad7695ad705d1ae0eb3c340b64420eb26c0

  • SHA512

    af8b8acbaf670a9dd3d76e35e42f082967a2c50fd4439a98a230625fe18ee78dce67cc957c4847e2f79853f3601b256c97600f661ab83d55871f46b6b2781a41

  • SSDEEP

    384:Rczr6iaVwJpxlyLdvjLCCvetrUJWiaV7r:RelxrojOxrUXI

Malware Config

Targets

    • Target

      eeb24a1ba8ac5d382158a0cf6818be1d_JaffaCakes118

    • Size

      40KB

    • MD5

      eeb24a1ba8ac5d382158a0cf6818be1d

    • SHA1

      078dd0c061a3afe3171437d504d2562e9ebd3201

    • SHA256

      2d49431463da6ba1b804807898881ad7695ad705d1ae0eb3c340b64420eb26c0

    • SHA512

      af8b8acbaf670a9dd3d76e35e42f082967a2c50fd4439a98a230625fe18ee78dce67cc957c4847e2f79853f3601b256c97600f661ab83d55871f46b6b2781a41

    • SSDEEP

      384:Rczr6iaVwJpxlyLdvjLCCvetrUJWiaV7r:RelxrojOxrUXI

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks