General

  • Target

    fb4b3b5c70a88eff5b4b60dbd3f30bcb_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240928-chrkmstena

  • MD5

    fb4b3b5c70a88eff5b4b60dbd3f30bcb

  • SHA1

    963a4e35e3320734c19f032365447c66177a7205

  • SHA256

    938a2360fc46d97cbb6d900ef3dea1603b1f3be667634cafaffa066b016f35d1

  • SHA512

    9f0fe7b6db3bed5dfada9899441dc411f1ea26920ba9f5a22192fca34e54164992ddbebc79c84cd0df4764149638da6233c85e244a29e6caedb3dc5efa45b1fb

  • SSDEEP

    12288:3ZWtI6RkguPuMjyfHSEG/BKMi40ce8YPX+VcaMVkUet7EwBI+APuO8:3uhanyfHSt5ZUcSPuOzVkUetVI5uO8

Malware Config

Targets

    • Target

      fb4b3b5c70a88eff5b4b60dbd3f30bcb_JaffaCakes118

    • Size

      1.2MB

    • MD5

      fb4b3b5c70a88eff5b4b60dbd3f30bcb

    • SHA1

      963a4e35e3320734c19f032365447c66177a7205

    • SHA256

      938a2360fc46d97cbb6d900ef3dea1603b1f3be667634cafaffa066b016f35d1

    • SHA512

      9f0fe7b6db3bed5dfada9899441dc411f1ea26920ba9f5a22192fca34e54164992ddbebc79c84cd0df4764149638da6233c85e244a29e6caedb3dc5efa45b1fb

    • SSDEEP

      12288:3ZWtI6RkguPuMjyfHSEG/BKMi40ce8YPX+VcaMVkUet7EwBI+APuO8:3uhanyfHSt5ZUcSPuOzVkUetVI5uO8

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks