General

  • Target

    fbb85b8bbef73eaee6c20d6c3d43bda9_JaffaCakes118

  • Size

    444KB

  • Sample

    240420-cvd53seh8t

  • MD5

    fbb85b8bbef73eaee6c20d6c3d43bda9

  • SHA1

    0ee8428f653fffc9b7420a140caf2acfee1c7905

  • SHA256

    1bb5f02a514e8feaec2bd3e8d943212e247b50bf3c46fc8fe96957bcac181e0a

  • SHA512

    e45de7860e03321bbe722298dd9034f428f6d380dd995261ef462c2abeb621c6a7519098550d8f1128a7bd2a6c1afbe402fce52c27f02d7df39558fe97781e71

  • SSDEEP

    6144:Yg+1vGoWAVU7XMA9DoNFwDPDQmrxdjE23Ur8HhWldHFC98inr284WHM13tjk6HXc:YgIvGoWAybMA9oF2a/rCkNyr2jzlHvJ

Malware Config

Targets

    • Target

      fbb85b8bbef73eaee6c20d6c3d43bda9_JaffaCakes118

    • Size

      444KB

    • MD5

      fbb85b8bbef73eaee6c20d6c3d43bda9

    • SHA1

      0ee8428f653fffc9b7420a140caf2acfee1c7905

    • SHA256

      1bb5f02a514e8feaec2bd3e8d943212e247b50bf3c46fc8fe96957bcac181e0a

    • SHA512

      e45de7860e03321bbe722298dd9034f428f6d380dd995261ef462c2abeb621c6a7519098550d8f1128a7bd2a6c1afbe402fce52c27f02d7df39558fe97781e71

    • SSDEEP

      6144:Yg+1vGoWAVU7XMA9DoNFwDPDQmrxdjE23Ur8HhWldHFC98inr284WHM13tjk6HXc:YgIvGoWAybMA9oF2a/rCkNyr2jzlHvJ

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (74) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks