General

  • Target

    073db2d4c037ec6ab98e585b4bf80a82_JaffaCakes118

  • Size

    99KB

  • Sample

    240620-ssy1gavalh

  • MD5

    073db2d4c037ec6ab98e585b4bf80a82

  • SHA1

    edd87ef1c49301756080e1c8df6a07aa96943218

  • SHA256

    9404ea46bfba15c208ffddc229915f0bdd9073e4686734936af738faaccb5bab

  • SHA512

    44417c38e00041c664842ad0102e52edd785db237446b4b2a67e1266491c3dfe4145e0855463546c826bbd8e6d5e109949940236066abb9e241ece194a00095a

  • SSDEEP

    3072:lcJfocnCEN7vDXNrh6JGVk8jwaaHw7Koj4rDMYgG:KNZrh6zD

Malware Config

Targets

    • Target

      073db2d4c037ec6ab98e585b4bf80a82_JaffaCakes118

    • Size

      99KB

    • MD5

      073db2d4c037ec6ab98e585b4bf80a82

    • SHA1

      edd87ef1c49301756080e1c8df6a07aa96943218

    • SHA256

      9404ea46bfba15c208ffddc229915f0bdd9073e4686734936af738faaccb5bab

    • SHA512

      44417c38e00041c664842ad0102e52edd785db237446b4b2a67e1266491c3dfe4145e0855463546c826bbd8e6d5e109949940236066abb9e241ece194a00095a

    • SSDEEP

      3072:lcJfocnCEN7vDXNrh6JGVk8jwaaHw7Koj4rDMYgG:KNZrh6zD

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks