General

  • Target

    a682c4b3e56dcfb369cf31afd45d3ea3_JaffaCakes118

  • Size

    671KB

  • Sample

    240613-t2j4cazgql

  • MD5

    a682c4b3e56dcfb369cf31afd45d3ea3

  • SHA1

    7723b77431a6a2f48fc385f0eb92638184817b23

  • SHA256

    2178fac016a38aaa00726f536099184268cc028ef81617c16b4f7a722c2b89c5

  • SHA512

    eec6afbdce566c4f3363170bfbc378cd5c1ea0fc3b257c6c8d5871d319394c6eebccf010898a922547985b3533dba15dfcfc8c2174a1398de5792c3664d3b180

  • SSDEEP

    12288:SZJ7G1zskWtP44444ItPZkTKpPwHb/dgusOlMLSTQNirbCfrL6h:qJ7Uzj4yUo7Fdle8WIbCL6h

Score
9/10

Malware Config

Targets

    • Target

      a682c4b3e56dcfb369cf31afd45d3ea3_JaffaCakes118

    • Size

      671KB

    • MD5

      a682c4b3e56dcfb369cf31afd45d3ea3

    • SHA1

      7723b77431a6a2f48fc385f0eb92638184817b23

    • SHA256

      2178fac016a38aaa00726f536099184268cc028ef81617c16b4f7a722c2b89c5

    • SHA512

      eec6afbdce566c4f3363170bfbc378cd5c1ea0fc3b257c6c8d5871d319394c6eebccf010898a922547985b3533dba15dfcfc8c2174a1398de5792c3664d3b180

    • SSDEEP

      12288:SZJ7G1zskWtP44444ItPZkTKpPwHb/dgusOlMLSTQNirbCfrL6h:qJ7Uzj4yUo7Fdle8WIbCL6h

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks