General

  • Target

    6c459f1f2a7f8ce737c09fefcef394fa_JaffaCakes118

  • Size

    426KB

  • Sample

    240523-z19khagf9v

  • MD5

    6c459f1f2a7f8ce737c09fefcef394fa

  • SHA1

    6375112f6aa2712764d5b2144e1a8daae2d6d05d

  • SHA256

    6e099ea101c25f2f052e7fb9eea5faa50be9bad020f3a37c7eca892d8a153171

  • SHA512

    d3b859a16aa2d7809402272094338c29c8b31d7f96ccb9714d2e45394828c58bc92d510cf077e5c53fb93271e75f67877302c7d41a397037d57f5a21431107c1

  • SSDEEP

    12288:hoXbRNyW4J2Kv+El/qX6Fimz4aa0p81MxAqnuz:hqb3KJH/np6F+uz

Malware Config

Targets

    • Target

      6c459f1f2a7f8ce737c09fefcef394fa_JaffaCakes118

    • Size

      426KB

    • MD5

      6c459f1f2a7f8ce737c09fefcef394fa

    • SHA1

      6375112f6aa2712764d5b2144e1a8daae2d6d05d

    • SHA256

      6e099ea101c25f2f052e7fb9eea5faa50be9bad020f3a37c7eca892d8a153171

    • SHA512

      d3b859a16aa2d7809402272094338c29c8b31d7f96ccb9714d2e45394828c58bc92d510cf077e5c53fb93271e75f67877302c7d41a397037d57f5a21431107c1

    • SSDEEP

      12288:hoXbRNyW4J2Kv+El/qX6Fimz4aa0p81MxAqnuz:hqb3KJH/np6F+uz

    • Adds policy Run key to start application

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks