General

  • Target

    04387be6016177db38c7bd299062daf3_JaffaCakes118

  • Size

    42KB

  • Sample

    240620-jx627s1fqr

  • MD5

    04387be6016177db38c7bd299062daf3

  • SHA1

    9e37d33488b9707fe2851d12d948d7078891b1a5

  • SHA256

    9680821cebe002991818795ae225a748772e9479272e9935ca97da41b30d6d73

  • SHA512

    7ea4816e4005fdb44e433a486b544692cce1265c50b5f1e33317724af7cddea1264c5d823326376cdd9a2ddaff6387d361772fa67f2fbe98d09ce678a4be5a8c

  • SSDEEP

    768:miGwwsx1McqaAr240zsMs8jDfU3AzeXCDuERXgcOwKhsAB3M1PmUvOA/eHw:ZYsXpAi4NMtceXtlK2g3oP7mA/eHw

Score
8/10

Malware Config

Targets

    • Target

      04387be6016177db38c7bd299062daf3_JaffaCakes118

    • Size

      42KB

    • MD5

      04387be6016177db38c7bd299062daf3

    • SHA1

      9e37d33488b9707fe2851d12d948d7078891b1a5

    • SHA256

      9680821cebe002991818795ae225a748772e9479272e9935ca97da41b30d6d73

    • SHA512

      7ea4816e4005fdb44e433a486b544692cce1265c50b5f1e33317724af7cddea1264c5d823326376cdd9a2ddaff6387d361772fa67f2fbe98d09ce678a4be5a8c

    • SSDEEP

      768:miGwwsx1McqaAr240zsMs8jDfU3AzeXCDuERXgcOwKhsAB3M1PmUvOA/eHw:ZYsXpAi4NMtceXtlK2g3oP7mA/eHw

    Score
    8/10
    • Blocklisted process makes network request

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks