General

  • Target

    e28ef345a79740d76e2a1cee292e4c75_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240406-pt3s9sba52

  • MD5

    e28ef345a79740d76e2a1cee292e4c75

  • SHA1

    e4aac6062af45f5b03c0642bbd5f31d7cebac6a5

  • SHA256

    10de7fcb912db00e42000522e1ce05c54d6e8df01874125314b4b6bf68ce4cb5

  • SHA512

    c8c2ffc51d4392c1d7b81be9af045cd72ef40bab2bb3e343ad38cf0ad4dfe576075f13b3c9404ec887e4ecc46f2dc30e8387eadc5ec317a8af7a7e86ada33b0b

  • SSDEEP

    49152:rG9cVgsLdtm9Ul9k9VnUmuzs9m4r3Mz2VvYbeEoKXXfPPlWE5:rwMgtUl9UAOhEoYXfnlWE5

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://galaint.onlinesecstats.info/?0=115&1=1&2=1&3=57&4=i&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000&12=dkqtnbycfl&14=1

Targets

    • Target

      e28ef345a79740d76e2a1cee292e4c75_JaffaCakes118

    • Size

      2.0MB

    • MD5

      e28ef345a79740d76e2a1cee292e4c75

    • SHA1

      e4aac6062af45f5b03c0642bbd5f31d7cebac6a5

    • SHA256

      10de7fcb912db00e42000522e1ce05c54d6e8df01874125314b4b6bf68ce4cb5

    • SHA512

      c8c2ffc51d4392c1d7b81be9af045cd72ef40bab2bb3e343ad38cf0ad4dfe576075f13b3c9404ec887e4ecc46f2dc30e8387eadc5ec317a8af7a7e86ada33b0b

    • SSDEEP

      49152:rG9cVgsLdtm9Ul9k9VnUmuzs9m4r3Mz2VvYbeEoKXXfPPlWE5:rwMgtUl9UAOhEoYXfnlWE5

    • UAC bypass

    • Disables taskbar notifications via registry modification

    • Sets file execution options in registry

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

2
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

6
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Impact

Service Stop

1
T1489

Tasks