General

  • Target

    10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118

  • Size

    83KB

  • Sample

    241003-y6cbhsycke

  • MD5

    10645df00efccbb58cfb48d38d8c3ce8

  • SHA1

    70fdb3fa56d5d9aba70e52a9984f1cae1260245c

  • SHA256

    fbd72924b6a6d5d8fbf2e285082c01234c1e4c376cd653a8e168f65f39e11221

  • SHA512

    96e11784c79f25c747e37fb49242a35ecb0a8ee8435d080cd01854c5a2347913cb03331e50143b93d8361f234b3cab4f2f560129994cd07dc4232e7a9acc3153

  • SSDEEP

    1536:S800hhPyECSfatTtP+xq3mnaZ1NJhkXAxfqr9D+:S800hhPyECSqefS1NJhkX5hy

Malware Config

Targets

    • Target

      10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118

    • Size

      83KB

    • MD5

      10645df00efccbb58cfb48d38d8c3ce8

    • SHA1

      70fdb3fa56d5d9aba70e52a9984f1cae1260245c

    • SHA256

      fbd72924b6a6d5d8fbf2e285082c01234c1e4c376cd653a8e168f65f39e11221

    • SHA512

      96e11784c79f25c747e37fb49242a35ecb0a8ee8435d080cd01854c5a2347913cb03331e50143b93d8361f234b3cab4f2f560129994cd07dc4232e7a9acc3153

    • SSDEEP

      1536:S800hhPyECSfatTtP+xq3mnaZ1NJhkXAxfqr9D+:S800hhPyECSqefS1NJhkX5hy

    • Modifies WinLogon for persistence

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks