General

  • Target

    ba40883e005f64abbb765f436a9f535c_JaffaCakes118

  • Size

    685KB

  • Sample

    241202-1apyvazjfq

  • MD5

    ba40883e005f64abbb765f436a9f535c

  • SHA1

    a1260d2f6ba066b0c402af1f525b26bb8a60e716

  • SHA256

    1ac5efef5495c03e0d32c791d6f145ac0d3373a7cd3ddf0003be9d8b19263ee9

  • SHA512

    1bb49b857dba2a2da4ab0ffa62a7ba44984674538aaab7d2d333b6a1750204e87c64abf7f5b21391a9a93a5c8add2b3f30c1a4a350fdd801bd90708edb2ab423

  • SSDEEP

    12288:rIVgjRD8IuBITB2hcgc/Co0GNk88ZJgaZMaSQsd9vOgG5f:rIajRgIuV61/iGV8YaZMaSbd9vOXf

Malware Config

Targets

    • Target

      ba40883e005f64abbb765f436a9f535c_JaffaCakes118

    • Size

      685KB

    • MD5

      ba40883e005f64abbb765f436a9f535c

    • SHA1

      a1260d2f6ba066b0c402af1f525b26bb8a60e716

    • SHA256

      1ac5efef5495c03e0d32c791d6f145ac0d3373a7cd3ddf0003be9d8b19263ee9

    • SHA512

      1bb49b857dba2a2da4ab0ffa62a7ba44984674538aaab7d2d333b6a1750204e87c64abf7f5b21391a9a93a5c8add2b3f30c1a4a350fdd801bd90708edb2ab423

    • SSDEEP

      12288:rIVgjRD8IuBITB2hcgc/Co0GNk88ZJgaZMaSQsd9vOgG5f:rIajRgIuV61/iGV8YaZMaSbd9vOXf

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Remote Service Session Hijacking: RDP Hijacking

      Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.

    • Indicator Removal: Network Share Connection Removal

      Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Modifies WinLogon

    • Drops file in System32 directory

    • Hide Artifacts: Hidden Users

MITRE ATT&CK Enterprise v15

Tasks