General

  • Target

    453cb2d1dbfa22b3b13b14e04d5d0ec8_JaffaCakes118

  • Size

    30KB

  • Sample

    241015-cabjfsxgph

  • MD5

    453cb2d1dbfa22b3b13b14e04d5d0ec8

  • SHA1

    ace36a9d434a24f6173964f826595043a8535a79

  • SHA256

    d064ea1157a9bf4b99ac0a4cb90a2a74099d060c2202cebedacd12ab54edcf02

  • SHA512

    6658162549a063503610d1c7e44e00ae21a8dd901119ee9a73dd8492efeb2a6670a84f2aa36b7e9296a23f5cb5818b2b5dfdb21ddfefa423ea535d9813598a66

  • SSDEEP

    768:7cyiJeMtNStKIrXEt7V3GmWmnbcuyD7U/u9:SdtNStvrXa71vnouy8G9

Malware Config

Targets

    • Target

      453cb2d1dbfa22b3b13b14e04d5d0ec8_JaffaCakes118

    • Size

      30KB

    • MD5

      453cb2d1dbfa22b3b13b14e04d5d0ec8

    • SHA1

      ace36a9d434a24f6173964f826595043a8535a79

    • SHA256

      d064ea1157a9bf4b99ac0a4cb90a2a74099d060c2202cebedacd12ab54edcf02

    • SHA512

      6658162549a063503610d1c7e44e00ae21a8dd901119ee9a73dd8492efeb2a6670a84f2aa36b7e9296a23f5cb5818b2b5dfdb21ddfefa423ea535d9813598a66

    • SSDEEP

      768:7cyiJeMtNStKIrXEt7V3GmWmnbcuyD7U/u9:SdtNStvrXa71vnouy8G9

    • UAC bypass

    • Stops running service(s)

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks