General

  • Target

    7e8735243b572f24fb40df9a29d99ecb_JaffaCakes118

  • Size

    8.5MB

  • Sample

    240528-1rybjsfa75

  • MD5

    7e8735243b572f24fb40df9a29d99ecb

  • SHA1

    3d3b9b2c629e5d35b54ffffb1240df0a2e155725

  • SHA256

    1dff748cbad8d2b8ec94f26a90f36ff1ace5cc273c95e2aa50aa704361672f84

  • SHA512

    5b877ea523e44d70fb7b4cacdc0d633206bfa9721e4f7a2d9d573831a752069fed0f0c61c4fb7da2cd6957d10bd289856a3fdc9cb3a3c2d43ee3520af020ec1f

  • SSDEEP

    196608:ZYOh1w0V2FM8iGZVV1lgaaRcbElqGeoQ92j0:ZfV/TGZVV1rElecw

Malware Config

Targets

    • Target

      7e8735243b572f24fb40df9a29d99ecb_JaffaCakes118

    • Size

      8.5MB

    • MD5

      7e8735243b572f24fb40df9a29d99ecb

    • SHA1

      3d3b9b2c629e5d35b54ffffb1240df0a2e155725

    • SHA256

      1dff748cbad8d2b8ec94f26a90f36ff1ace5cc273c95e2aa50aa704361672f84

    • SHA512

      5b877ea523e44d70fb7b4cacdc0d633206bfa9721e4f7a2d9d573831a752069fed0f0c61c4fb7da2cd6957d10bd289856a3fdc9cb3a3c2d43ee3520af020ec1f

    • SSDEEP

      196608:ZYOh1w0V2FM8iGZVV1lgaaRcbElqGeoQ92j0:ZfV/TGZVV1rElecw

    Score
    3/10
    • Target

      $PLUGINSDIR/ButtonEvent.dll

    • Size

      4KB

    • MD5

      fad9d09fc0267e8513b8628e767b2604

    • SHA1

      bea76a7621c07b30ed90bedef4d608a5b9e15300

    • SHA256

      5d913c6be9c9e13801acc5d78b11d9f3cd42c1b3b3cad8272eb6e1bfb06730c2

    • SHA512

      b39c5ea8aea0640f5a32a1fc03e8c8382a621c168980b3bc5e2897932878003b2b8ef75b3ad68149c35420d652143e2ef763b6a47d84ec73621017f0273e2805

    Score
    3/10
    • Target

      $PLUGINSDIR/MyNsisExtend.dll

    • Size

      596KB

    • MD5

      37e4e1ab9aee0596c2fa5888357a63b0

    • SHA1

      a5dba8c0a1bd936dca2b6a81f2dc9a3005f1a2b6

    • SHA256

      ff4b245fea98cedd881ca102468623a449a0b40df0c557dd8a6ea32e788d56fe

    • SHA512

      5cbab2872683079c6cc09423a2baf7107b5ac5731f336cd237fa93a4a4ee53a127963dc0ec0dbc6168b9b3d2c3a881c7663ce4ecd84d964628dd566395d49bb3

    • SSDEEP

      12288:1QXznhWxifqPG8yDAay0BQeMrtQW27ZJ6ObWTE5lqtmsVsIdj:1QXznYybPJnWTE5lqwsKG

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Target

      $PLUGINSDIR/NSISdl.dll

    • Size

      14KB

    • MD5

      a5f8399a743ab7f9c88c645c35b1ebb5

    • SHA1

      168f3c158913b0367bf79fa413357fbe97018191

    • SHA256

      dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    • SHA512

      824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

    • SSDEEP

      192:tUZTobBDJ68r67wmsvJI5ad9cXzFOVu+mZ/P3p+57CvpVqDxVp01Dwn2GRPgsfA:6Bo/680dCI5adOjFOg9//p27uNw2Go

    Score
    3/10
    • Target

      $PLUGINSDIR/System.dll

    • Size

      67KB

    • MD5

      bd05feb8825b15dcdd9100d478f04e17

    • SHA1

      a67d82be96a439ce1c5400740da5c528f7f550e0

    • SHA256

      4972cca9555b7e5dcb6feef63605305193835ea63f343df78902bbcd432ba496

    • SHA512

      67f1894c79bbcef4c7fedd91e33ec48617d5d34c2d9ebcd700c935b7fe1b08971d4c68a71d5281abac97e62d6b8c8f318cc6ff15ea210ddcf21ff04a9e5a7f95

    • SSDEEP

      1536:2IfbmtOpUtoqoQvfDrghNT+2w8mbJ1/NfSttVx:bfi4GoqVvbaNXubJ1JI

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Target

      $PLUGINSDIR/locate.dll

    • Size

      17KB

    • MD5

      7d3317f57c1a368480ace3c0ca804eeb

    • SHA1

      d4c7e185bc64aac82339f51ba6c21cf0713c9f1a

    • SHA256

      d88a04c1e39db583eaad727fd390fe599ab10198ee040bfbdd22daefadbd2372

    • SHA512

      5598c2e6caa2f66edd48f8c8305e054d4b0740b5f2b7ed92cf197a13ac66ba99a32013d34b3c2e28d007ab7979eb90a50681324eb736b1410e7df1902e4ec32a

    • SSDEEP

      384:ev/vPBkA6dK8wiLe45naPji7hpx2kRV+qgm:evyvwiNnGji7Xxjc8

    Score
    3/10
    • Target

      $PLUGINSDIR/nsDialogs.dll

    • Size

      9KB

    • MD5

      c10e04dd4ad4277d5adc951bb331c777

    • SHA1

      b1e30808198a3ae6d6d1cca62df8893dc2a7ad43

    • SHA256

      e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a

    • SHA512

      853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e

    • SSDEEP

      96:hBABCcnl5TKhkfLxSslykcxM2DjDf3GE+Xv8Xav+Yx4VndY7ndS27gA:h6n+0SAfRE+/8ZYxMdqn420

    Score
    3/10
    • Target

      $PLUGINSDIR/nsRandom.dll

    • Size

      77KB

    • MD5

      d86b2899f423931131b696ff659aa7ed

    • SHA1

      007ca98f5d7921fe26fb9b8bd8a822dd5ae09ed6

    • SHA256

      8935cba8e9b276daa357a809e0eca3bebf3fdc6d0d3466ab37fb2cbbfacd3a94

    • SHA512

      9a4437ab484e4e22597c642d21b0107a063a208a582df3a5bf276466ad8d0ba9aeebac6de8dcf1372939984bb187d58e94c799918cfbe80e85c958bf0a537fc7

    • SSDEEP

      1536:/lKXi95r2UwOpUtoqoQvfDrghNT+2w8mbJ1/NfSttVx:sgr2eGoqVvbaNXubJ1JI

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Target

      $PLUGINSDIR/xml.dll

    • Size

      175KB

    • MD5

      0ad70d0ebf9562e53f2fd9518c3b04a3

    • SHA1

      4de4487e4d1e87b782eceb3b74d9510cc28b0c70

    • SHA256

      3bd4a099f0e0eefeaacfdba6c0ab760b6e9250167ba6a30eafaa668ca53ce5e9

    • SHA512

      f75e089f7eb44071f227cd9705b8e44982429f889f93230e98095aac60afc1bdd39a010787235c171cd9fb9ead8023043b147022ab007e8cf1c3204064905719

    • SSDEEP

      3072:vzjLkarn7O+n9z2L6whFtGF42bKgGoqVvbaNXubJ1JI:vzP7n7O7L6K2lqVvWIdjI

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Target

      $TEMP/$_89_/MyNsisSkin.dll

    • Size

      384KB

    • MD5

      a6039ed51a4c143794345b29f5f09c64

    • SHA1

      ef08cb5dfa598d9d5b43b8af49f54b2c7dac00d4

    • SHA256

      95ae945504972cadcf2ccfb2b3d02ea8cade3ee53f2f2082e8b40b61f660877a

    • SHA512

      0ed3d0c070bfd91e2355aec5a30ad5cbaf6949c965af5e0ee1ecf2edd5f5aeba3819b4667a0301f8b52c8fd56d3bae35fa4f77063d56c8f89055784d0c0a30a8

    • SSDEEP

      6144:yOrNKQjNQnWqJolkFucBm1fXr9ICcYerKJbYm3IyU5qVvWIdjI:y4NKQjNQfqOuEm1fXncdrKJbJgtIdj

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Target

      DEC130.DLL

    • Size

      95KB

    • MD5

      d09677d10864caa509ab2ffbd7ad37e7

    • SHA1

      597cfd18fb18e3a9a8ff12b7c6ce5ad791be9bc3

    • SHA256

      da236c1b7890ff17b2a1249ea5e5abc4b3cc43dbed8908006ac5b8d505dfc2b6

    • SHA512

      0c3a54100b87157f84b477ef443c79293b8d03c8c6ca7201548258f1546938c3b31aa96fab691651541011064fb9dc4ba97fb638daf7019a405f7297b98b313c

    • SSDEEP

      768:F3sAhUUqLqBWAfqTMdFY4FFnofqTFm/D3c8ytBJd7kgTphZHxpR6kLLWSecGHFzR:F3bqLoLRFY4FFkamwtN7NffpskL8cy

    Score
    1/10
    • Target

      EDEC.DLL

    • Size

      113KB

    • MD5

      26b1f5d031c67a0b4a1832d1b4e6422c

    • SHA1

      55e3f43d5658f2d11e07009b16c741f9c878e692

    • SHA256

      8e2161bb8e06751e523f52b763f55d4c74e62a260b0820613111d1351717abc0

    • SHA512

      f5014a47c5990701839d20f893d74eabdfa60d50d2a879d197541fe0141434a25bead206b6eef3237ba71d862201ca0767df9deecb8c66a52e5a952742f127e0

    • SSDEEP

      3072:/ee/ef/hUwswzItFXRohA3AJ2k2FQI/J:/R/g/RuFaWVb

    Score
    3/10
    • Target

      WINPLAY.DLL

    • Size

      58KB

    • MD5

      e1cd821e799f27721edea04bc246c762

    • SHA1

      54e7a448ebafbeaefec0c3dc2ad9e1cd1df0d8af

    • SHA256

      c8c3af221724bfa3cd4e0da8400bbc8a417c844989e5c082823fc033ac16ea4b

    • SHA512

      49f27538a13f647195bf203ac6cfeff118a27b60557bcc4a75c878d83bd67e5426b4a7469d622867f6d9b9fafabe264d5c1cb6bd7fc38296e5bfa12f03c655e0

    • SSDEEP

      1536:4go/+clcAq8JWkRwUkrRsZPPTduDU5bz+WgYlm:ZclcALJRsuZPPTo4Rz+WgYlm

    Score
    1/10
    • Target

      WINSDEC.DLL

    • Size

      86KB

    • MD5

      f220b7353e550c8e017ab2d90fd83ae3

    • SHA1

      9395e998cdcc7ef048d22c2f48e687cf57a9aae5

    • SHA256

      f8d75ed1b1b92683dfef76fe5cde7a48a0a2066c20dfc1526a0b8088caa40b4d

    • SHA512

      6d59810b07caa19f1929fbe4d036029d14c5b615226ae2e4e4ffbc945c2fbc3be7eb2029d13ec03e8470c664af9dc7fb80520dd3959d871baf34999b1af1bd33

    • SSDEEP

      1536:sshr0jAEFGPO2HiqHdVgnVubKmMW2A3Ao:JYnFGPObqHvgncW9W2A3A

    Score
    3/10
    • Target

      WINSTR.DLL

    • Size

      72KB

    • MD5

      31269ef2475300687fd75c33e39c2062

    • SHA1

      3e77a165b339e87b67e2b14e3c7dca201cb4124d

    • SHA256

      e6101f498c555fc1a98aa7bd5ea060a848408b78d1cc4fc0e54c81d30b2986ad

    • SHA512

      177041feb1026c2ddc08b91f2ae6c602b0c9943c781a435b0047a0ac265e0d651fe27d059171a71795e5b4aba02017760fca37d2b783df62cdead80339ceaa57

    • SSDEEP

      1536:6ACaKiMrTPf1UPp9fslmgJXdudkvtoWoegMt:PKZrT3yxlsIqodkvm9egMt

    Score
    1/10
    • Target

      tr2gold.exe

    • Size

      689KB

    • MD5

      ee00d88ea1977a089f13b49efe6af6bf

    • SHA1

      ca556def41de074538eabe6735842e3f2f58df78

    • SHA256

      6acc27850054b599f87eff9cd016993dc65c288967f9bdb4e8a543e56df87b3a

    • SHA512

      c1129217cb8e0d0e77eff9f3eb805b753f51f63492c78187dc87ad2013a4c2135efa756613cb14b9a7fc3a2f33f92bcb696ce9a3ca2168e7bc0ac7b861aede99

    • SSDEEP

      12288:NYCBQ+xvUWbfFS92rUemPmAcGn21ByoIfoaJRhHsO1uEvc3px8s2RVz/Q7O:NYCBQ+x8N92rUTP3crsoCoaJrfIrP8sA

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks

static1

upx
Score
7/10

behavioral1

Score
3/10

behavioral2

Score
3/10

behavioral3

Score
3/10

behavioral4

Score
3/10

behavioral5

ramnitbankerspywarestealertrojanupxworm
Score
10/10

behavioral6

ramnitbankerspywarestealertrojanupxworm
Score
10/10

behavioral7

Score
3/10

behavioral8

Score
3/10

behavioral9

ramnitbankerspywarestealertrojanupxworm
Score
10/10

behavioral10

ramnitbankerspywarestealertrojanupxworm
Score
10/10

behavioral11

Score
3/10

behavioral12

Score
3/10

behavioral13

Score
3/10

behavioral14

Score
3/10

behavioral15

ramnitbankerspywarestealertrojanupxworm
Score
10/10

behavioral16

ramnitbankerspywarestealertrojanupxworm
Score
10/10

behavioral17

ramnitbankerspywarestealertrojanupxworm
Score
10/10

behavioral18

ramnitbankerspywarestealertrojanupxworm
Score
10/10

behavioral19

ramnitbankerspywarestealertrojanupxworm
Score
10/10

behavioral20

ramnitbankerspywarestealertrojanupxworm
Score
10/10

behavioral21

Score
1/10

behavioral22

Score
1/10

behavioral23

Score
3/10

behavioral24

Score
3/10

behavioral25

Score
1/10

behavioral26

Score
1/10

behavioral27

Score
3/10

behavioral28

Score
3/10

behavioral29

Score
1/10

behavioral30

Score
1/10

behavioral31

Score
6/10

behavioral32

Score
6/10