General

  • Target

    27e7b5e63c78ab0a516f6b36823a19fe_JaffaCakes118

  • Size

    215KB

  • Sample

    241009-a2wbtsyfkb

  • MD5

    27e7b5e63c78ab0a516f6b36823a19fe

  • SHA1

    c93431751718f7e829e2509fbcf3e8e851d7cc8c

  • SHA256

    776ce61e81cdc67fd5ad1bce892a3953772f7549fea98025fceba28730e37c82

  • SHA512

    fc99870d56ed4700569bb61db077b991f426d34e15bfac75100d0e59a333973e5831596edab1a400d4cd716bb6540290c468aa94d8525be26e791bfc6b39838e

  • SSDEEP

    6144:yrus9yzI0PJpo+qpWxZ/OygXq042iLZiYVa261:yrIzI0MpWxtOyAq0mHm

Malware Config

Targets

    • Target

      27e7b5e63c78ab0a516f6b36823a19fe_JaffaCakes118

    • Size

      215KB

    • MD5

      27e7b5e63c78ab0a516f6b36823a19fe

    • SHA1

      c93431751718f7e829e2509fbcf3e8e851d7cc8c

    • SHA256

      776ce61e81cdc67fd5ad1bce892a3953772f7549fea98025fceba28730e37c82

    • SHA512

      fc99870d56ed4700569bb61db077b991f426d34e15bfac75100d0e59a333973e5831596edab1a400d4cd716bb6540290c468aa94d8525be26e791bfc6b39838e

    • SSDEEP

      6144:yrus9yzI0PJpo+qpWxZ/OygXq042iLZiYVa261:yrIzI0MpWxtOyAq0mHm

    • Modifies WinLogon for persistence

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks