General

  • Target

    a300e9fe2c174096e0a92220f74a0e68_JaffaCakes118

  • Size

    335KB

  • Sample

    240403-wsd7vagf4s

  • MD5

    a300e9fe2c174096e0a92220f74a0e68

  • SHA1

    7b8338ebb296abad21c8d63f2652de3630825f1b

  • SHA256

    e58b701285daa0a72aef877c1a071daabca1e4871091d1e87db57201fdf824ec

  • SHA512

    a4d6a4dd3171f528dabe64fac174ec7750771f66c311e5c6723d94927546b4a4490287a007a1bfb48bac01f6240d5419c99fd842c72301ba6d54b4bb5fd324f7

  • SSDEEP

    6144:hG/6NCZ0uF50WYWfoJUNqMYSd/nK7W0yhJDZFcD66UVWIhe+7RiJvwT7XWuK7:hskCZ0usW9fDWStjhxDc8WI0+7AJuzy

Malware Config

Targets

    • Target

      a300e9fe2c174096e0a92220f74a0e68_JaffaCakes118

    • Size

      335KB

    • MD5

      a300e9fe2c174096e0a92220f74a0e68

    • SHA1

      7b8338ebb296abad21c8d63f2652de3630825f1b

    • SHA256

      e58b701285daa0a72aef877c1a071daabca1e4871091d1e87db57201fdf824ec

    • SHA512

      a4d6a4dd3171f528dabe64fac174ec7750771f66c311e5c6723d94927546b4a4490287a007a1bfb48bac01f6240d5419c99fd842c72301ba6d54b4bb5fd324f7

    • SSDEEP

      6144:hG/6NCZ0uF50WYWfoJUNqMYSd/nK7W0yhJDZFcD66UVWIhe+7RiJvwT7XWuK7:hskCZ0usW9fDWStjhxDc8WI0+7AJuzy

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks