General

  • Target

    184f67f6ed6e4ff1ea09063492f539df_JaffaCakes118

  • Size

    156KB

  • Sample

    241006-qx8z5awgnm

  • MD5

    184f67f6ed6e4ff1ea09063492f539df

  • SHA1

    cf86368fa6aa3f582167f47d068873bc6b85c3a2

  • SHA256

    0e5e1cab47264a5d4748b81597bd9bcbf7d0e36bf1de760736fe845080a213ea

  • SHA512

    a3ce6dd435d160749e1cbaeb98982acc65c4b572b075fd52e765be71a61cb42f812d2c1a37fedabaab8ee0ac12917c6c02efe033242bf5d1c57e3378bc55eefe

  • SSDEEP

    3072:M+wmxkFi/Honi75PoAZ7ZEWCdVjgn2PgMf7IYlIi:YqkFi/Ht7nZ2dLm2Pg87v

Malware Config

Targets

    • Target

      184f67f6ed6e4ff1ea09063492f539df_JaffaCakes118

    • Size

      156KB

    • MD5

      184f67f6ed6e4ff1ea09063492f539df

    • SHA1

      cf86368fa6aa3f582167f47d068873bc6b85c3a2

    • SHA256

      0e5e1cab47264a5d4748b81597bd9bcbf7d0e36bf1de760736fe845080a213ea

    • SHA512

      a3ce6dd435d160749e1cbaeb98982acc65c4b572b075fd52e765be71a61cb42f812d2c1a37fedabaab8ee0ac12917c6c02efe033242bf5d1c57e3378bc55eefe

    • SSDEEP

      3072:M+wmxkFi/Honi75PoAZ7ZEWCdVjgn2PgMf7IYlIi:YqkFi/Ht7nZ2dLm2Pg87v

    • Modifies WinLogon for persistence

    • Adds policy Run key to start application

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks