General

  • Target

    0bd434f7dfc0e9b656cccc8fc20a8297_JaffaCakes118

  • Size

    711KB

  • Sample

    241002-waltzasdmc

  • MD5

    0bd434f7dfc0e9b656cccc8fc20a8297

  • SHA1

    41d1995e04a9b0745d965b35cd24dab5683d3634

  • SHA256

    ef32669ab7534445cb232be111ce0440abac0a7501091b89a5e15c0c6be16396

  • SHA512

    881f2cb95ce0fb12303e0b80df4701118da13ecfb5b4b9889844eb9f6bcf3b9f8ee3692af232ba13ae7fc83223f1f5bc738005f50ec1cdbae83cfdb66783ded3

  • SSDEEP

    12288:6iVdqjx2ckaQEIxCmdRxsXXuoUsg7gtTL7+4cACXjlil5+wEdRCxUMVR66Vi:6iVd4waQEIxCmRxsXeoUT7o+7pRwEdn3

Malware Config

Targets

    • Target

      0bd434f7dfc0e9b656cccc8fc20a8297_JaffaCakes118

    • Size

      711KB

    • MD5

      0bd434f7dfc0e9b656cccc8fc20a8297

    • SHA1

      41d1995e04a9b0745d965b35cd24dab5683d3634

    • SHA256

      ef32669ab7534445cb232be111ce0440abac0a7501091b89a5e15c0c6be16396

    • SHA512

      881f2cb95ce0fb12303e0b80df4701118da13ecfb5b4b9889844eb9f6bcf3b9f8ee3692af232ba13ae7fc83223f1f5bc738005f50ec1cdbae83cfdb66783ded3

    • SSDEEP

      12288:6iVdqjx2ckaQEIxCmdRxsXXuoUsg7gtTL7+4cACXjlil5+wEdRCxUMVR66Vi:6iVd4waQEIxCmRxsXeoUT7o+7pRwEdn3

    • Creates new service(s)

    • Modifies Windows Firewall

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks