General

  • Target

    7d12718184f35c6818bc111a1f5c69c5_JaffaCakes118

  • Size

    5.7MB

  • Sample

    240401-3apdesad68

  • MD5

    7d12718184f35c6818bc111a1f5c69c5

  • SHA1

    637806858f9c7f2fd2f2e4289e1b5afbe2c00b58

  • SHA256

    52bb9b4983378e9f6320427b1f0e6f142de7ecbe3aae04b9f920274a706ae55d

  • SHA512

    fafdb853d95478d56704e94fef6c3c95a409ba9573e6428684a49b0855f3dfb4717e7e28fd30d1943ffcdf11605046d735e2f042348318a54552c110171a03c9

  • SSDEEP

    49152:vTbWVRE2rb/T/vO90dL3BmAFd4A64nsfJ1g8Dl5oVIqmen/tjgO6YdFN9I9Ws/Hd:vTiMvDEmAQQQQQQQQQQQQQj

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1

Targets

    • Target

      7d12718184f35c6818bc111a1f5c69c5_JaffaCakes118

    • Size

      5.7MB

    • MD5

      7d12718184f35c6818bc111a1f5c69c5

    • SHA1

      637806858f9c7f2fd2f2e4289e1b5afbe2c00b58

    • SHA256

      52bb9b4983378e9f6320427b1f0e6f142de7ecbe3aae04b9f920274a706ae55d

    • SHA512

      fafdb853d95478d56704e94fef6c3c95a409ba9573e6428684a49b0855f3dfb4717e7e28fd30d1943ffcdf11605046d735e2f042348318a54552c110171a03c9

    • SSDEEP

      49152:vTbWVRE2rb/T/vO90dL3BmAFd4A64nsfJ1g8Dl5oVIqmen/tjgO6YdFN9I9Ws/Hd:vTiMvDEmAQQQQQQQQQQQQQj

    • ServHelper

      ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Modifies RDP port number used by Windows

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • Loads dropped DLL

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks