General

  • Target

    f1a6a91259ea201342d1a9c035642e70_JaffaCakes118

  • Size

    484KB

  • Sample

    240415-wksehaeh4v

  • MD5

    f1a6a91259ea201342d1a9c035642e70

  • SHA1

    f713c64835cf5ff000ca26191db5dde15bce9e2d

  • SHA256

    5c1599ec81c6a7edf459a7597c29a2eb711d7458baf56264afc66da3fffcf891

  • SHA512

    53c860ebd609f5624cfe3689fcdc6643802cd5ebe722080a1edb21198285eb8d30135db1198ab1f2063515df06ef9d69ae020e9744267e8029889de14e7f60bd

  • SSDEEP

    12288:w5alGSqm2P5bdgA8XeGx1Rg6v3rGDnZ1i:tkS72RbBpr6aK

Malware Config

Targets

    • Target

      f1a6a91259ea201342d1a9c035642e70_JaffaCakes118

    • Size

      484KB

    • MD5

      f1a6a91259ea201342d1a9c035642e70

    • SHA1

      f713c64835cf5ff000ca26191db5dde15bce9e2d

    • SHA256

      5c1599ec81c6a7edf459a7597c29a2eb711d7458baf56264afc66da3fffcf891

    • SHA512

      53c860ebd609f5624cfe3689fcdc6643802cd5ebe722080a1edb21198285eb8d30135db1198ab1f2063515df06ef9d69ae020e9744267e8029889de14e7f60bd

    • SSDEEP

      12288:w5alGSqm2P5bdgA8XeGx1Rg6v3rGDnZ1i:tkS72RbBpr6aK

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (58) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks