General

  • Target

    efb7a8cb82a282ba4facfee291ba7482_JaffaCakes118

  • Size

    738KB

  • Sample

    240921-nvhzta1bjj

  • MD5

    efb7a8cb82a282ba4facfee291ba7482

  • SHA1

    1f0adbf4a8d03adaed09fad7c862326b31a38a66

  • SHA256

    0a3e0b6808b7a5bfb6684869b50ffb018672bba45bb17016b4d399631b8a615a

  • SHA512

    340377d495ee436f315364100904f6dcb11e656ddd2ddbd3ebf27ba62ce86c2c74c4ffd23d24f58dc056448d2f88c90f5be2baaaaff801a584243ecd5ce0bb69

  • SSDEEP

    12288:IaWzgMg7v3qnCi4ErQohh0F4ECJ8lny7Q7JRLm4+lJB+eNl:faHMv6C0rjsny7Q7JlU

Malware Config

Targets

    • Target

      efb7a8cb82a282ba4facfee291ba7482_JaffaCakes118

    • Size

      738KB

    • MD5

      efb7a8cb82a282ba4facfee291ba7482

    • SHA1

      1f0adbf4a8d03adaed09fad7c862326b31a38a66

    • SHA256

      0a3e0b6808b7a5bfb6684869b50ffb018672bba45bb17016b4d399631b8a615a

    • SHA512

      340377d495ee436f315364100904f6dcb11e656ddd2ddbd3ebf27ba62ce86c2c74c4ffd23d24f58dc056448d2f88c90f5be2baaaaff801a584243ecd5ce0bb69

    • SSDEEP

      12288:IaWzgMg7v3qnCi4ErQohh0F4ECJ8lny7Q7JRLm4+lJB+eNl:faHMv6C0rjsny7Q7JlU

    • Modifies WinLogon for persistence

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks