General

  • Target

    8cd07c066d43459d9a254b678d23cb56_JaffaCakes118

  • Size

    124KB

  • Sample

    240602-eg7lksaf89

  • MD5

    8cd07c066d43459d9a254b678d23cb56

  • SHA1

    4d81ea9cf3f2e529e2196f5c4e0863d007642b25

  • SHA256

    fcc1e8e6a507d8379f5ddd46d47de2d846e5be37acdc117a7e103bacfd075b3e

  • SHA512

    b7c9a3cb907385e19a57c56bbf43217f6ceec9f20605acc8149d97d4cdf73c1493974983246453f306fb7f48c6f037efb577399d84c3f1a3a3a19bcb6830ea0a

  • SSDEEP

    3072:/K08JHSK2wlYUPeYcOcc37J3nQTSleBo67K1iHiHqr/:/V8Rn2mYUPe9OccLJXazBo67OiCH+

Malware Config

Targets

    • Target

      8cd07c066d43459d9a254b678d23cb56_JaffaCakes118

    • Size

      124KB

    • MD5

      8cd07c066d43459d9a254b678d23cb56

    • SHA1

      4d81ea9cf3f2e529e2196f5c4e0863d007642b25

    • SHA256

      fcc1e8e6a507d8379f5ddd46d47de2d846e5be37acdc117a7e103bacfd075b3e

    • SHA512

      b7c9a3cb907385e19a57c56bbf43217f6ceec9f20605acc8149d97d4cdf73c1493974983246453f306fb7f48c6f037efb577399d84c3f1a3a3a19bcb6830ea0a

    • SSDEEP

      3072:/K08JHSK2wlYUPeYcOcc37J3nQTSleBo67K1iHiHqr/:/V8Rn2mYUPe9OccLJXazBo67OiCH+

    • Sets file execution options in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks