General

  • Target

    bcd60a52e09a677d14a87f8cf55fce9b_JaffaCakes118

  • Size

    2.7MB

  • Sample

    240618-tpzm9sverj

  • MD5

    bcd60a52e09a677d14a87f8cf55fce9b

  • SHA1

    69f723a2acea3e9ef0dc72c65d2fd43206009d3c

  • SHA256

    2db4c8f3de370ce986d40094283e66f2d7e8b73c4ab3ab797a3443b54bc48f63

  • SHA512

    0b30ea4050cbf1219bfbf965d61236fc181186917830b7d41748b10a367e33aaf3403569de61c517c7b88cd3ac10394f443243821ab2a55e41f1f0f3e62af2be

  • SSDEEP

    49152:jWTx21QlbRc+URFrOltwUA2wKEAdGS/9bB8Jks30RftSkugk6vQ:qt210bR2ruwUTEUL/4axtSkuWvQ

Malware Config

Targets

    • Target

      bcd60a52e09a677d14a87f8cf55fce9b_JaffaCakes118

    • Size

      2.7MB

    • MD5

      bcd60a52e09a677d14a87f8cf55fce9b

    • SHA1

      69f723a2acea3e9ef0dc72c65d2fd43206009d3c

    • SHA256

      2db4c8f3de370ce986d40094283e66f2d7e8b73c4ab3ab797a3443b54bc48f63

    • SHA512

      0b30ea4050cbf1219bfbf965d61236fc181186917830b7d41748b10a367e33aaf3403569de61c517c7b88cd3ac10394f443243821ab2a55e41f1f0f3e62af2be

    • SSDEEP

      49152:jWTx21QlbRc+URFrOltwUA2wKEAdGS/9bB8Jks30RftSkugk6vQ:qt210bR2ruwUTEUL/4axtSkuWvQ

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks