General

  • Target

    fa1af9f89f182ceaf85cdc39a9bb55b9_JaffaCakes118

  • Size

    2.1MB

  • Sample

    240419-mj79wsge88

  • MD5

    fa1af9f89f182ceaf85cdc39a9bb55b9

  • SHA1

    b66a479eaeaf45be1b5bb52968550724d0ef0934

  • SHA256

    f58bb7ef51d62cbca14778caffadd854dad7a1a5682cc2016f775310b0464058

  • SHA512

    7fbf3ea63ef918abce0806512872f8608e9771c5069eade5246623434ed1489f9ae3c1b6c7cf7bb8f5f75f8bb3c5600d5fb4a6d07c38806e6d6e114ecc8c0a7f

  • SSDEEP

    49152:4WFVbrhPYRE7ri2iqfRIIJyiCpVPG/NBOf/WbsWa:xFVbryO7r/fRhIiQVw8/WbsWa

Malware Config

Targets

    • Target

      fa1af9f89f182ceaf85cdc39a9bb55b9_JaffaCakes118

    • Size

      2.1MB

    • MD5

      fa1af9f89f182ceaf85cdc39a9bb55b9

    • SHA1

      b66a479eaeaf45be1b5bb52968550724d0ef0934

    • SHA256

      f58bb7ef51d62cbca14778caffadd854dad7a1a5682cc2016f775310b0464058

    • SHA512

      7fbf3ea63ef918abce0806512872f8608e9771c5069eade5246623434ed1489f9ae3c1b6c7cf7bb8f5f75f8bb3c5600d5fb4a6d07c38806e6d6e114ecc8c0a7f

    • SSDEEP

      49152:4WFVbrhPYRE7ri2iqfRIIJyiCpVPG/NBOf/WbsWa:xFVbryO7r/fRhIiQVw8/WbsWa

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VMWare services registry key.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Virtualization/Sandbox Evasion

3
T1497

Modify Registry

2
T1112

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

3
T1497

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks