General

  • Target

    f924ea1d9a529af64d57c5daa6f55bab_JaffaCakes118

  • Size

    205KB

  • Sample

    240419-a9fw4sbg55

  • MD5

    f924ea1d9a529af64d57c5daa6f55bab

  • SHA1

    e39ec476abb7acce4e713f15fb121ceed72b12c2

  • SHA256

    872339e661e1a90638d6981b8b09d56cccebdfdfad0fabb2c5100f4c05bccce7

  • SHA512

    3d59266b9bbfa01dd4c694faa42f53d8c87eae2698cfdfdd941eaa6cfaeeb2383c0fdf4deb32f4c0ecaf8ffa671737ee7d6acbd186ef8ee3c0ef85e79719140c

  • SSDEEP

    6144:tU5lqJ5dGjL4i86p4hLznblMs57Rn+eiX:+Ed4E5bh/RXC

Malware Config

Targets

    • Target

      f924ea1d9a529af64d57c5daa6f55bab_JaffaCakes118

    • Size

      205KB

    • MD5

      f924ea1d9a529af64d57c5daa6f55bab

    • SHA1

      e39ec476abb7acce4e713f15fb121ceed72b12c2

    • SHA256

      872339e661e1a90638d6981b8b09d56cccebdfdfad0fabb2c5100f4c05bccce7

    • SHA512

      3d59266b9bbfa01dd4c694faa42f53d8c87eae2698cfdfdd941eaa6cfaeeb2383c0fdf4deb32f4c0ecaf8ffa671737ee7d6acbd186ef8ee3c0ef85e79719140c

    • SSDEEP

      6144:tU5lqJ5dGjL4i86p4hLznblMs57Rn+eiX:+Ed4E5bh/RXC

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Modifies file permissions

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

File and Directory Permissions Modification

1
T1222

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks