General

  • Target

    039778726d7389a0631934261e682504_JaffaCakes118

  • Size

    180KB

  • Sample

    240930-3akp8szcnr

  • MD5

    039778726d7389a0631934261e682504

  • SHA1

    f44a1a0b2948e0e13d58f63228056072fa3e756c

  • SHA256

    bb7e38cf0fffad588eaa3c5dedb1d397563d98eb0ada63efe8915e177bce6d74

  • SHA512

    7f587b70c3ac2a288b21167cd071bc9271976c4eb40ac43097b4cd5ea5b337cec36bcf5570eb78d4ceab53d2901b996fc0dc546ccfcc3f2088a012e1fe1c1c27

  • SSDEEP

    3072:2JbpHsK6c0lFY+pjYt/hbjakh+exzoBbh:2Jbps7lYtJh+exo

Malware Config

Targets

    • Target

      039778726d7389a0631934261e682504_JaffaCakes118

    • Size

      180KB

    • MD5

      039778726d7389a0631934261e682504

    • SHA1

      f44a1a0b2948e0e13d58f63228056072fa3e756c

    • SHA256

      bb7e38cf0fffad588eaa3c5dedb1d397563d98eb0ada63efe8915e177bce6d74

    • SHA512

      7f587b70c3ac2a288b21167cd071bc9271976c4eb40ac43097b4cd5ea5b337cec36bcf5570eb78d4ceab53d2901b996fc0dc546ccfcc3f2088a012e1fe1c1c27

    • SSDEEP

      3072:2JbpHsK6c0lFY+pjYt/hbjakh+exzoBbh:2Jbps7lYtJh+exo

    • Modifies WinLogon for persistence

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks