General

  • Target

    09ed7344eee8f9318c7034a301ef3827_JaffaCakes118

  • Size

    830KB

  • Sample

    241002-k4cmlsyaml

  • MD5

    09ed7344eee8f9318c7034a301ef3827

  • SHA1

    e6ed7f3b871bd701452928f985b47366b6785e7d

  • SHA256

    1dc9169b13668d93f8fee7110c7baab6489c711cd1b052c5bb4b9685840a0c9c

  • SHA512

    0db16491e7fcca4ab72c7a2b6ee393b5e7e32a0eb4b7519d1bfaed3ad98a4a377ecae78aabcc87c6c52945f7ed2cb6fc7e41dbc73d76d9820ac01af7cfe9ecdf

  • SSDEEP

    3072:rW5qzKL4+xaX2Qam6yYQkRwLWnmnqHfERw8PJxaR/tZn1/NXgmuq:S1D42SYQMwLWn6qE+8iR/tLKe

Malware Config

Targets

    • Target

      09ed7344eee8f9318c7034a301ef3827_JaffaCakes118

    • Size

      830KB

    • MD5

      09ed7344eee8f9318c7034a301ef3827

    • SHA1

      e6ed7f3b871bd701452928f985b47366b6785e7d

    • SHA256

      1dc9169b13668d93f8fee7110c7baab6489c711cd1b052c5bb4b9685840a0c9c

    • SHA512

      0db16491e7fcca4ab72c7a2b6ee393b5e7e32a0eb4b7519d1bfaed3ad98a4a377ecae78aabcc87c6c52945f7ed2cb6fc7e41dbc73d76d9820ac01af7cfe9ecdf

    • SSDEEP

      3072:rW5qzKL4+xaX2Qam6yYQkRwLWnmnqHfERw8PJxaR/tZn1/NXgmuq:S1D42SYQMwLWn6qE+8iR/tLKe

    • Modifies WinLogon for persistence

    • Modifies security service

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks