General

  • Target

    8f5d67bc0b29f521207a2f9257d0d7d0_JaffaCakes118

  • Size

    212KB

  • Sample

    240602-zjptrsfe32

  • MD5

    8f5d67bc0b29f521207a2f9257d0d7d0

  • SHA1

    0602e7c04f1143e50ad2c6e927d99437eeeec498

  • SHA256

    712188651d241cd59a33944defac63854524aa97771977d825df2ed4e1ab83e0

  • SHA512

    067a3cd763b5641946e7fda381eda8326dccf70b6a475f30ff9ab5b0f78c15a17491cf0e48c7a4c74d8a09c212d28d88748fc6d14b8eac4730f1b38ab875d7fd

  • SSDEEP

    3072:mmDvSy93/kZq3eGNEL3nC1sRj79n7maxwRm44SX4v:mmDvh9vkZbGNEHDn7bagSIv

Malware Config

Targets

    • Target

      8f5d67bc0b29f521207a2f9257d0d7d0_JaffaCakes118

    • Size

      212KB

    • MD5

      8f5d67bc0b29f521207a2f9257d0d7d0

    • SHA1

      0602e7c04f1143e50ad2c6e927d99437eeeec498

    • SHA256

      712188651d241cd59a33944defac63854524aa97771977d825df2ed4e1ab83e0

    • SHA512

      067a3cd763b5641946e7fda381eda8326dccf70b6a475f30ff9ab5b0f78c15a17491cf0e48c7a4c74d8a09c212d28d88748fc6d14b8eac4730f1b38ab875d7fd

    • SSDEEP

      3072:mmDvSy93/kZq3eGNEL3nC1sRj79n7maxwRm44SX4v:mmDvh9vkZbGNEHDn7bagSIv

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Browser Extensions

1
T1176

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Modify Registry

4
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks