General

  • Target

    f514765530986c23a91058653a7a6eff_JaffaCakes118

  • Size

    167KB

  • Sample

    240417-fkbtrafg9t

  • MD5

    f514765530986c23a91058653a7a6eff

  • SHA1

    e6bedcdecdacd57424d7749a1e37ed1435fbaa39

  • SHA256

    7de4139f6a85b50229330443e20993dc94fa106fa66002673d03a6b5e92d58d9

  • SHA512

    4390acc9d8c4ccb94797865557073145ddfe57fe6df3ef382d4d46b8b95ffab0715dc3d2106e724a057acf5eed414c99aef6ea5f66c4817c607cbb8fb8f61bc3

  • SSDEEP

    3072:EGEEhNJBwT7tYWLOumoJQX2ZNcjopjiuwCdf6/dZ9OlEGe8:EGPUT7rCum6QXUNiS/yklle8

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      f514765530986c23a91058653a7a6eff_JaffaCakes118

    • Size

      167KB

    • MD5

      f514765530986c23a91058653a7a6eff

    • SHA1

      e6bedcdecdacd57424d7749a1e37ed1435fbaa39

    • SHA256

      7de4139f6a85b50229330443e20993dc94fa106fa66002673d03a6b5e92d58d9

    • SHA512

      4390acc9d8c4ccb94797865557073145ddfe57fe6df3ef382d4d46b8b95ffab0715dc3d2106e724a057acf5eed414c99aef6ea5f66c4817c607cbb8fb8f61bc3

    • SSDEEP

      3072:EGEEhNJBwT7tYWLOumoJQX2ZNcjopjiuwCdf6/dZ9OlEGe8:EGPUT7rCum6QXUNiS/yklle8

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks