General

  • Target

    826fd66a643b1bacb947074ba9feb560_JaffaCakes118

  • Size

    284KB

  • Sample

    241031-j9lxsssqdy

  • MD5

    826fd66a643b1bacb947074ba9feb560

  • SHA1

    897bfcef2b840ba4cb3dfe1e574c9cb63a563d52

  • SHA256

    c1b1520dcf00a42aca356767aa975188caf50fb8e4aaa7450e7a85ef74ed6104

  • SHA512

    a4de4d801a6641d2e7bb9b4f90591029688ce2c94badc7cdb4d006f36799b7d438ddfe9d8e909043448d4c81bd1721ad51aac5e3e94c6db99e314953f2d7e1ac

  • SSDEEP

    3072:TdVd2Hayox1aMOpNa9+BdVd2Hayox1aMzpNa9e65BQZB1VLpCjARIqERZ00Te/za:5uHOFwuHOanrG1VVE+IJe/W

Malware Config

Targets

    • Target

      826fd66a643b1bacb947074ba9feb560_JaffaCakes118

    • Size

      284KB

    • MD5

      826fd66a643b1bacb947074ba9feb560

    • SHA1

      897bfcef2b840ba4cb3dfe1e574c9cb63a563d52

    • SHA256

      c1b1520dcf00a42aca356767aa975188caf50fb8e4aaa7450e7a85ef74ed6104

    • SHA512

      a4de4d801a6641d2e7bb9b4f90591029688ce2c94badc7cdb4d006f36799b7d438ddfe9d8e909043448d4c81bd1721ad51aac5e3e94c6db99e314953f2d7e1ac

    • SSDEEP

      3072:TdVd2Hayox1aMOpNa9+BdVd2Hayox1aMzpNa9e65BQZB1VLpCjARIqERZ00Te/za:5uHOFwuHOanrG1VVE+IJe/W

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks