General

  • Target

    f9b992d99917082935e006d7f5289e7c_JaffaCakes118

  • Size

    7.3MB

  • Sample

    240419-hf6vfabb32

  • MD5

    f9b992d99917082935e006d7f5289e7c

  • SHA1

    f21ed04973c2acc6425692276d02ad1a738c7d7f

  • SHA256

    db6e0959ef8a9783c96160323e761d20fb8cb035a34dc061f42afce5075e9543

  • SHA512

    f965632276cbf41d095030cf26c630eea9852869fa8159c7da96fa0489d772525ef4a546b7bda689bcfde7d664d8cfea945afde8542cd2b3f8f3d3f5c61c3f71

  • SSDEEP

    196608:tNUZgvaKpXSRc9t0n27hKJSOKM+kROpQfqf0vjR4C:PwgvaK8St0ncKJSOK/kROpjEW

Score
7/10

Malware Config

Targets

    • Target

      f9b992d99917082935e006d7f5289e7c_JaffaCakes118

    • Size

      7.3MB

    • MD5

      f9b992d99917082935e006d7f5289e7c

    • SHA1

      f21ed04973c2acc6425692276d02ad1a738c7d7f

    • SHA256

      db6e0959ef8a9783c96160323e761d20fb8cb035a34dc061f42afce5075e9543

    • SHA512

      f965632276cbf41d095030cf26c630eea9852869fa8159c7da96fa0489d772525ef4a546b7bda689bcfde7d664d8cfea945afde8542cd2b3f8f3d3f5c61c3f71

    • SSDEEP

      196608:tNUZgvaKpXSRc9t0n27hKJSOKM+kROpQfqf0vjR4C:PwgvaK8St0ncKJSOK/kROpjEW

    Score
    7/10
    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks