General

  • Target

    45f7a759f842b17a906dc78c54f07fea_JaffaCakes118

  • Size

    1.7MB

  • Sample

    241015-fmskaawdrc

  • MD5

    45f7a759f842b17a906dc78c54f07fea

  • SHA1

    16b0dc5be06a6596c2d1856a72e3808f52f0d525

  • SHA256

    60df45b9b43f6876187030be134652eb86ef6faa0b1908855ec1edbe7cd695a2

  • SHA512

    43eea71ddf80f5895156d538fab79eacde8b5be32fdaf6ce4b4a3f76dcf226533a618697bcf2202b00aa7edf9a364cff55972fc2ebab7e699cd240a0f93e1c72

  • SSDEEP

    49152:c/acXOlrSXY4JzPzFZOPslLebA5rOYiZn9:V8OlrSRKERebSivZn9

Malware Config

Targets

    • Target

      45f7a759f842b17a906dc78c54f07fea_JaffaCakes118

    • Size

      1.7MB

    • MD5

      45f7a759f842b17a906dc78c54f07fea

    • SHA1

      16b0dc5be06a6596c2d1856a72e3808f52f0d525

    • SHA256

      60df45b9b43f6876187030be134652eb86ef6faa0b1908855ec1edbe7cd695a2

    • SHA512

      43eea71ddf80f5895156d538fab79eacde8b5be32fdaf6ce4b4a3f76dcf226533a618697bcf2202b00aa7edf9a364cff55972fc2ebab7e699cd240a0f93e1c72

    • SSDEEP

      49152:c/acXOlrSXY4JzPzFZOPslLebA5rOYiZn9:V8OlrSRKERebSivZn9

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

MITRE ATT&CK Enterprise v15

Tasks