General

  • Target

    3efe1780b2e7a0e42a1a581fc39527f9_JaffaCakes118

  • Size

    400KB

  • Sample

    240513-mbacwshh5t

  • MD5

    3efe1780b2e7a0e42a1a581fc39527f9

  • SHA1

    3a98da21973dd548592c8462f44398f3e72a8d84

  • SHA256

    58a35c67b8342b4093f0f16c7367a6cb9311df2b667d7e4a2213d24a19f83192

  • SHA512

    3f27439818a6c3435462f449481b53bc1da71844770cfe85ff153a9b1c7ce5415f30bf405d4620f9b086b4c7dbdc93b86884dd0b4e5466e86d1c6c1eb6448979

  • SSDEEP

    6144:MpRAIHdkODcHVOUpUPcVXi4+8Qtvshkq826SkOO79jKZux4yh/jKeBCCpTGI3iSH:M6ODGpbXiStF6SkXFKFyh/LBCciqqnup

Malware Config

Targets

    • Target

      3efe1780b2e7a0e42a1a581fc39527f9_JaffaCakes118

    • Size

      400KB

    • MD5

      3efe1780b2e7a0e42a1a581fc39527f9

    • SHA1

      3a98da21973dd548592c8462f44398f3e72a8d84

    • SHA256

      58a35c67b8342b4093f0f16c7367a6cb9311df2b667d7e4a2213d24a19f83192

    • SHA512

      3f27439818a6c3435462f449481b53bc1da71844770cfe85ff153a9b1c7ce5415f30bf405d4620f9b086b4c7dbdc93b86884dd0b4e5466e86d1c6c1eb6448979

    • SSDEEP

      6144:MpRAIHdkODcHVOUpUPcVXi4+8Qtvshkq826SkOO79jKZux4yh/jKeBCCpTGI3iSH:M6ODGpbXiStF6SkXFKFyh/LBCciqqnup

    • Adds policy Run key to start application

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks