General

  • Target

    9ea8d4e12257ab39ff70ed6d2219eaaa_JaffaCakes118

  • Size

    1.7MB

  • Sample

    241125-31e8fatjcs

  • MD5

    9ea8d4e12257ab39ff70ed6d2219eaaa

  • SHA1

    d1be9af646e81616e38917a546ea7fbdf63b0121

  • SHA256

    d531a60f0a3c222d5470c3f326cd99b05008da171933fc4d795a47d85eee4d0d

  • SHA512

    8afdee4e3a0303c835c7a33e03eb1b1fe27f888aa25b1027464e05cc524d7568a89f41f70eb146025d1c78da2f08e0e7754d5b1c93c753451ce6f45aa5282ff4

  • SSDEEP

    12288:gOJUOB0/OZUOB0/OZUOB0/OZUOB0/OZUOB0/OZUOB0OqzpIys7bA:wOUOUOUOUOUOczpObA

Malware Config

Targets

    • Target

      9ea8d4e12257ab39ff70ed6d2219eaaa_JaffaCakes118

    • Size

      1.7MB

    • MD5

      9ea8d4e12257ab39ff70ed6d2219eaaa

    • SHA1

      d1be9af646e81616e38917a546ea7fbdf63b0121

    • SHA256

      d531a60f0a3c222d5470c3f326cd99b05008da171933fc4d795a47d85eee4d0d

    • SHA512

      8afdee4e3a0303c835c7a33e03eb1b1fe27f888aa25b1027464e05cc524d7568a89f41f70eb146025d1c78da2f08e0e7754d5b1c93c753451ce6f45aa5282ff4

    • SSDEEP

      12288:gOJUOB0/OZUOB0/OZUOB0/OZUOB0/OZUOB0/OZUOB0OqzpIys7bA:wOUOUOUOUOUOczpObA

    • Disables service(s)

    • Modifies visibility of file extensions in Explorer

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks