General

  • Target

    5293caf8da5a2ec1c309b2350b8c3dd9_JaffaCakes118

  • Size

    3.5MB

  • Sample

    240518-cfne7sfb7x

  • MD5

    5293caf8da5a2ec1c309b2350b8c3dd9

  • SHA1

    29468c93893106897c24bd141eb6ab418114c3b9

  • SHA256

    a1dec2c5f22022b4978a4a77dff567d90f34ad47d9ebddb93ed67a833cdceb72

  • SHA512

    d25412c34d6f47b6bdafe31dcc8cac6f2822a122098010e34e05757cab39c7bc33665f4f87d0254e85acaea7af82eda8731308c5c270e35072a20ba2e0e32e8b

  • SSDEEP

    49152:iootQwPR5/uU6SkrjFdr9cLS3nMI/05zOKE1antX00I2qTtMi5PKJxxpfKuNsIu7:PkQS2U6zjTxP/05zvntX0L9Oau3b2EM

Malware Config

Targets

    • Target

      5293caf8da5a2ec1c309b2350b8c3dd9_JaffaCakes118

    • Size

      3.5MB

    • MD5

      5293caf8da5a2ec1c309b2350b8c3dd9

    • SHA1

      29468c93893106897c24bd141eb6ab418114c3b9

    • SHA256

      a1dec2c5f22022b4978a4a77dff567d90f34ad47d9ebddb93ed67a833cdceb72

    • SHA512

      d25412c34d6f47b6bdafe31dcc8cac6f2822a122098010e34e05757cab39c7bc33665f4f87d0254e85acaea7af82eda8731308c5c270e35072a20ba2e0e32e8b

    • SSDEEP

      49152:iootQwPR5/uU6SkrjFdr9cLS3nMI/05zOKE1antX00I2qTtMi5PKJxxpfKuNsIu7:PkQS2U6zjTxP/05zvntX0L9Oau3b2EM

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks