General

  • Target

    65e165d12355c000afa0d8e76cf82d6f_JaffaCakes118

  • Size

    7.7MB

  • Sample

    240522-d7z4raag95

  • MD5

    65e165d12355c000afa0d8e76cf82d6f

  • SHA1

    729b37eb3fad99f462fae08226e7bda3c45a98ee

  • SHA256

    afd362ba35b8a9866adeac14236015416c7e87cd713bfa0bf9b82392e49e3e29

  • SHA512

    25893609410699ee86fb87fc3ef9cb0961a2fa9b2829768563d188264423402abc495ce0e62348a4a25f406faf10b0212fc3a3376c25a9d21cfc75d936b6b16d

  • SSDEEP

    196608:VrsQU0PaMvb2Rc56Y7+T9NGqhOwIudYGs:dsQU0PfvbwU6dbAuG

Malware Config

Targets

    • Target

      65e165d12355c000afa0d8e76cf82d6f_JaffaCakes118

    • Size

      7.7MB

    • MD5

      65e165d12355c000afa0d8e76cf82d6f

    • SHA1

      729b37eb3fad99f462fae08226e7bda3c45a98ee

    • SHA256

      afd362ba35b8a9866adeac14236015416c7e87cd713bfa0bf9b82392e49e3e29

    • SHA512

      25893609410699ee86fb87fc3ef9cb0961a2fa9b2829768563d188264423402abc495ce0e62348a4a25f406faf10b0212fc3a3376c25a9d21cfc75d936b6b16d

    • SSDEEP

      196608:VrsQU0PaMvb2Rc56Y7+T9NGqhOwIudYGs:dsQU0PfvbwU6dbAuG

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks